메뉴 건너뛰기




Volumn , Issue , 2010, Pages 281-288

Formal modelling of a robust Wireless Sensor Network routing protocol

Author keywords

[No Author keywords available]

Indexed keywords

BLACK HOLE ATTACK; COMMUNICATION RESOURCES; DENIAL OF SERVICE ATTACKS; DOS ATTACKS; FORMAL MODEL; FORMAL MODELLING; FORMAL VERIFICATIONS; HARDWARE IMPLEMENTATIONS; HOSTILE ENVIRONMENTS; LOW COSTS; POTENTIAL SOLUTIONS; SELF ORGANIZING; SMALL SIZE; VISUAL INSPECTION; WHOLE SYSTEMS; WORST CASE;

EID: 77956960777     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AHS.2010.5546247     Document Type: Conference Paper
Times cited : (29)

References (14)
  • 1
    • 54249085013 scopus 로고    scopus 로고
    • Automated evaluation of secure route discovery in MANET protocols
    • K. Havelund, R. Majumdar, and J. Palsberg, editors, Los Angeles, CA, USA, Volume 5156 of Lecture Notes in Computer Science, Springer, August 10-12
    • T. Andel and A. Yasinsac. Automated evaluation of secure route discovery in MANET protocols. In K. Havelund, R. Majumdar, and J. Palsberg, editors, Proceedings of 15th International SPIN Workshop on Model Checking Software (SPIN 2008),Los Angeles, CA, USA, volume 5156 of Lecture Notes in Computer Science, pages 26-41. Springer, August 10-12, 2008.
    • (2008) Proceedings of 15th International SPin Workshop on Model Checking Software (SPin 2008) , pp. 26-41
    • Andel, T.1    Yasinsac, A.2
  • 6
    • 0034539015 scopus 로고    scopus 로고
    • Directed diffusion: A scalable and robust communication paradigm for sensor networks
    • C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed diffusion: a scalable and robust communication paradigm for sensor networks. In Mobile Computing and Networking, pages 56-67, 2000.
    • (2000) Mobile Computing and Networking , pp. 56-67
    • Intanagonwiwat, C.1    Govindan, R.2    Estrin, D.3
  • 10
    • 77956954805 scopus 로고    scopus 로고
    • Formal modelling and analysis of routing protocol security in wireless sensor networks
    • 22-23 June
    • K. Saghar, W. Henderson, and D. Kendel. Formal modelling and analysis of routing protocol security in wireless sensor networks. In PGNET 2009,Liverpool, UK, pages 179-184, 22-23 June 2009.
    • (2009) PGNET 2009, Liverpool, UK , pp. 179-184
    • Saghar, K.1    Henderson, W.2    Kendel, D.3
  • 13
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Sep
    • A. Wood and J. Stankovic. Denial of service in sensor networks. In IEEE Computer, volume 35, pages 54-62, Sep 2002.
    • (2002) IEEE Computer , vol.35 , pp. 54-62
    • Wood, A.1    Stankovic, J.2
  • 14
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • S. Zhu, S. Setia, and S. Jajodia. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In ACM Conference on Computer and Communications Security (CCS'03), pages 62-72, October 2003. (Pubitemid 40673789)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.