메뉴 건너뛰기




Volumn 5156 LNCS, Issue , 2008, Pages 26-41

Automated evaluation of secure route discovery in MANET protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; ELECTRIC NETWORK TOPOLOGY; MODAL ANALYSIS; MODEL CHECKING; NETWORK PROTOCOLS; ROUTING PROTOCOLS; SENSOR NETWORKS; SPIN DYNAMICS; TECHNICAL PRESENTATIONS; TOPOLOGY;

EID: 54249085013     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85114-1_5     Document Type: Conference Paper
Times cited : (15)

References (26)
  • 1
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad hoc mobile wireless networks
    • Royer, E.M., Toh, C.-K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications 6, 46-55 (1999)
    • (1999) IEEE Personal Communications , vol.6 , pp. 46-55
    • Royer, E.M.1    Toh, C.-K.2
  • 2
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • Hu, Y.C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Security & Privacy 2, 28-39 (2004)
    • (2004) IEEE Security & Privacy , vol.2 , pp. 28-39
    • Hu, Y.C.1    Perrig, A.2
  • 5
    • 54249101364 scopus 로고    scopus 로고
    • Surveying Security Analysis Techniques in MANET Routing Protocols
    • Andel, T.R., Yasinsac, A.: Surveying Security Analysis Techniques in MANET Routing Protocols. IEEE Communications Surveys & Tutorials 9, 70-84 (2007)
    • (2007) IEEE Communications Surveys & Tutorials , vol.9 , pp. 70-84
    • Andel, T.R.1    Yasinsac, A.2
  • 8
    • 35048830853 scopus 로고    scopus 로고
    • Automatized Verification of Ad Hoc Routing Protocols
    • de Frutos-Escrig, D, Nüñez, M, eds, FORTE 2004, Springer, Heidelberg
    • Wibling, O., Parrow, J., Pears, A.: Automatized Verification of Ad Hoc Routing Protocols. In: de Frutos-Escrig, D., Nüñez, M. (eds.) FORTE 2004. LNCS, vol. 3235, pp. 343-358. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3235 , pp. 343-358
    • Wibling, O.1    Parrow, J.2    Pears, A.3
  • 9
    • 0346263728 scopus 로고    scopus 로고
    • Formal verification of standards for distance vector routing protocols
    • Bhargavan, K., Obradovic. D., Gunter. C.A.: Formal verification of standards for distance vector routing protocols. Journal of the ACM 49, 538-576 (2002)
    • (2002) Journal of the ACM , vol.49 , pp. 538-576
    • Bhargavan, K.1    Obradovic, D.2    Gunter, C.A.3
  • 10
    • 54249154766 scopus 로고    scopus 로고
    • Andel, T.R., Yasinsac, A.: Automated Security Analysis of Ad Hoc Routing Protocols Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA 2007), Wroclaw, Poland, pp. 9-26 (2007)
    • Andel, T.R., Yasinsac, A.: Automated Security Analysis of Ad Hoc Routing Protocols Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA 2007), Wroclaw, Poland, pp. 9-26 (2007)
  • 11
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
    • Hu, Y.-C, Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks 11, 21-38 (2005)
    • (2005) Wireless Networks , vol.11 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 12
    • 85008543309 scopus 로고    scopus 로고
    • Provably secure on-demand source routing in mobile ad hoc networks
    • Ács, G., Buttyán, L., Vajda, I.: Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing 5, 1533-1546 (2006)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , pp. 1533-1546
    • Ács, G.1    Buttyán, L.2    Vajda, I.3
  • 17
    • 0000289556 scopus 로고    scopus 로고
    • Formal methods: State of the art and future directions
    • Clarke, E.M., Wing, J.M.: Formal methods: state of the art and future directions. ACM Computing Surveys 28, 626-643 (1996)
    • (1996) ACM Computing Surveys , vol.28 , pp. 626-643
    • Clarke, E.M.1    Wing, J.M.2
  • 19
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An Overview
    • Meadows, C.: The NRL Protocol Analyzer: An Overview. The Journal of Logic Programming 26, 113-131 (1996)
    • (1996) The Journal of Logic Programming , vol.26 , pp. 113-131
    • Meadows, C.1
  • 20
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
    • Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 21
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • Song, D., Berezin, S., Perrig, A.: Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security 9, 47-74 (2001)
    • (2001) Journal of Computer Security , vol.9 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3
  • 22
    • 33750440529 scopus 로고    scopus 로고
    • A framework for security analysis of mobile wireless networks
    • Nanz, S., Hankin, C.: A framework for security analysis of mobile wireless networks. Theoretical Computer Science 367, 203-227 (2006)
    • (2006) Theoretical Computer Science , vol.367 , pp. 203-227
    • Nanz, S.1    Hankin, C.2
  • 24
    • 84893561028 scopus 로고    scopus 로고
    • Using SPIN to Verify Security Properties of Cryptographic Protocols
    • Bošnački, D, Leue, S, eds, SPIN, Springer, Heidelberg
    • Maggi, P., Sisto, R.: Using SPIN to Verify Security Properties of Cryptographic Protocols. In: Bošnački, D., Leue, S. (eds.) SPIN 2002. LNCS, vol. 2318, pp. 187-204. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2318 , pp. 187-204
    • Maggi, P.1    Sisto, R.2
  • 25
    • 0013451778 scopus 로고    scopus 로고
    • Department of Computer Science. University of Twente, Deventer, The Netherlands
    • Ruys, T.C.: Towards effective model checking. Department of Computer Science. University of Twente, Deventer, The Netherlands (2001)
    • (2001) Towards effective model checking
    • Ruys, T.C.1
  • 26
    • 34547650617 scopus 로고    scopus 로고
    • The Invisible Node Attack Revisited
    • Richmond
    • Andel, T.R., Yasinsac, A.: The Invisible Node Attack Revisited, pp. 686-691. IEEE SoutheastCon, Richmond (2007)
    • (2007) IEEE SoutheastCon , pp. 686-691
    • Andel, T.R.1    Yasinsac, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.