메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Formal analysis of sensor network encryption protocol (SNEP)

Author keywords

Avispa toolbox; Model checking; Security protocols; SNEP; Wireless sensor

Indexed keywords

ARSENIC; BASE STATIONS; CRYPTOGRAPHY; FORMAL LANGUAGES; HIGH LEVEL LANGUAGES; HYBRID SENSORS; LAWS AND LEGISLATION; MODEL CHECKING; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; REAL TIME SYSTEMS; RELIABILITY; ROUTING PROTOCOLS; SECURITY OF DATA; SENSORS; WIRELESS NETWORKS; WIRELESS SENSOR NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 50249132547     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBHOC.2007.4428763     Document Type: Conference Paper
Times cited : (32)

References (22)
  • 1
    • 26444497860 scopus 로고    scopus 로고
    • A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuéllar, P. H. Drielsma, P.-C. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The AVISPA tool for the automated validation of internet security protocols and applications. In K. Etessami and S. K. Rajamani, editors, CAV, 3576 of Lecture Notes in Computer Science, pages 281-285. Springer, 2005.
    • A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuéllar, P. H. Drielsma, P.-C. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The AVISPA tool for the automated validation of internet security protocols and applications. In K. Etessami and S. K. Rajamani, editors, CAV, volume 3576 of Lecture Notes in Computer Science, pages 281-285. Springer, 2005.
  • 2
    • 33745824225 scopus 로고    scopus 로고
    • Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario
    • L. Aceto and A. Ingólfsdóttir, editors, FoSSaCS, of, Springer
    • M. Backes, S. Mödersheim, B. Pfitzmann, and L. Viganò. Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. In L. Aceto and A. Ingólfsdóttir, editors, FoSSaCS, volume 3921 of Lecture Notes in Computer Science, pages 428-445. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3921 , pp. 428-445
    • Backes, M.1    Mödersheim, S.2    Pfitzmann, B.3    Viganò, L.4
  • 3
    • 14844303360 scopus 로고    scopus 로고
    • Verifying policy-based security for web services
    • V. Atluri, B. Pfitzmann, and P. D. McDaniel, editors, ACM
    • K. Bhargavan, C. Fournet, and A. D. Gordon. Verifying policy-based security for web services. In V. Atluri, B. Pfitzmann, and P. D. McDaniel, editors, ACM Conference on Computer and Communications Security, pages 268-277. ACM, 2004.
    • (2004) ACM Conference on Computer and Communications Security , pp. 268-277
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 4
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • IEEE Computer Society
    • H. Chan, A. Perrig, and D. X. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, page 197. IEEE Computer Society, 2003.
    • (2003) IEEE Symposium on Security and Privacy , pp. 197
    • Chan, H.1    Perrig, A.2    Song, D.X.3
  • 7
    • 0019649307 scopus 로고
    • On the security of public key protocols
    • IEEE
    • D. Dolev and A. C.-C. Yao. On the security of public key protocols. In FOCS, pages 350-357. IEEE, 1981.
    • (1981) FOCS , pp. 350-357
    • Dolev, D.1    Yao, A.C.-C.2
  • 11
    • 3042686296 scopus 로고    scopus 로고
    • Formal verification of pap and eap-md5 protocols in wireless networks: Fdr model checking
    • 02:264
    • I.-G. Kim and J.-Y. Choi. Formal verification of pap and eap-md5 protocols in wireless networks: Fdr model checking. aina, 02:264, 2004.
    • (2004) aina
    • Kim, I.-G.1    Choi, J.-Y.2
  • 12
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6(1-2):53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 53-84
    • Lowe, G.1
  • 14
    • 33745787568 scopus 로고    scopus 로고
    • J. C. Mitchell. Finite-state analysis of security protocols. In A. J. Hu and M. Y. Vardi, editors, CAV, 1427 of Lecture Notes in Computer Science, pages 71-76. Springer, 1998.
    • J. C. Mitchell. Finite-state analysis of security protocols. In A. J. Hu and M. Y. Vardi, editors, CAV, volume 1427 of Lecture Notes in Computer Science, pages 71-76. Springer, 1998.
  • 15
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • A. Perrig, J. A. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53-57, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.A.2    Wagner, D.3
  • 18
    • 33646140557 scopus 로고    scopus 로고
    • Application of formal methods to the analysis of web services security
    • M. Bravetti, L. Kloul, and G. Zavattaro, editors, EPEW/WS-FM, of, Springer
    • M. L. Tobarra, D. Cazorla, F. Cuartero, and G. Diaz. Application of formal methods to the analysis of web services security. In M. Bravetti, L. Kloul, and G. Zavattaro, editors, EPEW/WS-FM, volume 3670 of Lecture Notes in Computer Science, pages 215-229. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3670 , pp. 215-229
    • Tobarra, M.L.1    Cazorla, D.2    Cuartero, F.3    Diaz, G.4
  • 20
    • 14844304757 scopus 로고    scopus 로고
    • TinyPK: Securing sensor networks with public key technology
    • S. Setia and V. Swarup, editors, ACM
    • R. J. Watro, D. Kong, S.-f. Cuti, C. Gardiner, C. Lynn, and P. Kruus. TinyPK: securing sensor networks with public key technology. In S. Setia and V. Swarup, editors, SASN, pages 59-64. ACM, 2004.
    • (2004) SASN , pp. 59-64
    • Watro, R.J.1    Kong, D.2    Cuti, S.-F.3    Gardiner, C.4    Lynn, C.5    Kruus, P.6
  • 21
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • S. Jajodia, V. Atluri, and T. Jaeger, editors, ACM
    • S. Zhu, S. Setia, and S. Jajodia. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In S. Jajodia, V. Atluri, and T. Jaeger, editors, ACM Conference on Computer and Communications Security, pages 62-72. ACM, 2003.
    • (2003) ACM Conference on Computer and Communications Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 22
    • 33847120377 scopus 로고    scopus 로고
    • LEAP : Efficient security mechanisms for large-scale distributed sensor networks
    • S. Zhu, S. Setia, and S. Jajodia. LEAP : Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks, 2(4):500-528, 2006.
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.