메뉴 건너뛰기




Volumn , Issue , 2010, Pages 191-202

Model checking ad hoc network routing protocols: ARAN vs. endair A

Author keywords

Ad hoc networks; Formal protocol analysis; Model checking; Secure routing protocols

Indexed keywords

FORMAL ANALYSIS; MODEL CHECKER; PROTOCOL ANALYSIS; SECURE ROUTING PROTOCOLS; SECURITY PROTOCOLS;

EID: 78650504762     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SEFM.2010.24     Document Type: Conference Paper
Times cited : (23)

References (29)
  • 2
    • 85031307530 scopus 로고
    • Highly dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for mobile computers
    • C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," in Proceedings of SIGCOMM, 1994, pp. 234- 244.
    • (1994) Proceedings of SIGCOMM , pp. 234-244
    • Perkins, C.E.1    Bhagwat, P.2
  • 4
    • 34347349933 scopus 로고    scopus 로고
    • Ad-hoc on-demand distance vector routing
    • IEEE Computer Society Press
    • C. E. Perkins and E. M. Belding-Royer, "Ad-hoc On-Demand Distance Vector Routing," in Proceedings of WMCSA. IEEE Computer Society Press, 1999, pp. 90-100.
    • (1999) Proceedings of WMCSA , pp. 90-100
    • Perkins, C.E.1    Belding-Royer, E.M.2
  • 6
    • 0036980294 scopus 로고    scopus 로고
    • Securing ad hoc routing protocols
    • ACM
    • M. G. Zapata and N. Asokan, "Securing Ad Hoc Routing Protocols," in Proceedings of WiSe. ACM, 2002, pp. 1-10.
    • (2002) Proceedings of WiSe , pp. 1-10
    • Zapata, M.G.1    Asokan, N.2
  • 8
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Wireless Networks, vol. 11, no. 1-2, pp. 21-38, 2005.
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 10
    • 85008543309 scopus 로고    scopus 로고
    • Provably secure on- demand source routing in mobile ad hoc networks
    • G. Ács, L. Buttyán, and I. Vajda, "Provably Secure On- Demand Source Routing in Mobile Ad Hoc Networks," IEEE Transaction on Mobile Computing, vol. 5, no. 11, pp. 1533- 1546, 2006.
    • (2006) IEEE Transaction on Mobile Computing , vol.5 , Issue.11 , pp. 1533-1546
    • Ács, G.1    Buttyán, L.2    Vajda, I.3
  • 11
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Computer Society Press
    • B. Blanchet, "An efficient cryptographic protocol verifier based on prolog rules," in Proceedings of CSF'01. IEEE Computer Society Press, 2001, pp. 82-96.
    • (2001) Proceedings of CSF'01 , pp. 82-96
    • Blanchet, B.1
  • 12
    • 78650439921 scopus 로고    scopus 로고
    • "The AVISPA Tool," http://www.avispa-project.org/.
    • The AVISPA Tool
  • 13
    • 0020720357 scopus 로고
    • On the security of public-key protocols
    • D. Dolev and A. Yao, "On the Security of Public-Key Protocols," IEEE Trans. on Info. Theory, vol. 2, no. 29, 1983.
    • (1983) IEEE Trans. on Info. Theory , vol.2 , Issue.29
    • Dolev, D.1    Yao, A.2
  • 15
    • 78650508247 scopus 로고    scopus 로고
    • Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK
    • M. L. Tobarra, D. Cazorla, F. Cuartero, G. Díaz, and M.- E. Cambronero, "Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP + TinyPK," Telecommunication Systems, vol. 40, no. 3-4, pp. 91-99, 2009.
    • (2009) Telecommunication Systems , vol.40 , Issue.3-4 , pp. 91-99
    • Tobarra, M.L.1    Cazorla, D.2    Cuartero, F.3    Díaz, G.4    Cambronero, M.-.E.5
  • 16
    • 70349335930 scopus 로고    scopus 로고
    • The open-source fixed- point model checker for symbolic analysis of security protocols
    • ser. LNCS 5705. Springer-Verlag
    • S. Mödersheim and L. Viganò, "The Open-Source Fixed- Point Model Checker for Symbolic Analysis of Security Protocols," in FOSAD 2008/2009, ser. LNCS 5705. Springer-Verlag, 2009, pp. 166-194.
    • (2009) FOSAD 2008/2009 , pp. 166-194
    • Mödersheim, S.1    Viganó, L.2
  • 17
    • 4544302090 scopus 로고    scopus 로고
    • Modeling vulnerabilities of ad hoc routing protocols
    • ACM
    • S. Yang and J. S. Baras, "Modeling vulnerabilities of ad hoc routing protocols," in Proceedings of SASN. ACM, 2003, pp. 12-20.
    • (2003) Proceedings of SASN , pp. 12-20
    • Yang, S.1    Baras, J.S.2
  • 18
    • 14844337112 scopus 로고    scopus 로고
    • Towards provable security for ad hoc routing protocols
    • ACM
    • L. Buttyán and I. Vajda, "Towards provable security for ad hoc routing protocols," in Proceedings of SASN. ACM, 2004, pp. 94-105.
    • (2004) Proceedings of SASN , pp. 94-105
    • Buttyán, L.1    Vajda, I.2
  • 19
    • 33745747748 scopus 로고    scopus 로고
    • Provable security of ondemand distance vector routing in wireless ad hoc networks
    • ser. LNCS 3813. Springer
    • G. Ács, L. Buttyán, and I. Vajda, "Provable security of ondemand distance vector routing in wireless ad hoc networks," in Proceedings of ESAS, ser. LNCS 3813. Springer, 2005, pp. 113-127.
    • (2005) Proceedings of ESAS , pp. 113-127
    • Ács, G.1    Buttyán, L.2    Vajda, I.3
  • 20
    • 85008543309 scopus 로고    scopus 로고
    • Provably secure on-demand source routing in mobile ad hoc networks
    • Ács G., Buttyán L., Vajda I., "Provably secure on-demand source routing in mobile ad hoc networks," IEEE Trans. Mob. Comput., vol. 5, no. 11, pp. 1533-1546, 2006.
    • (2006) IEEE Trans. Mob. Comput. , vol.5 , Issue.11 , pp. 1533-1546
    • Ács, G.1    Buttyán, L.2    Vajda, I.3
  • 21
    • 33750440529 scopus 로고    scopus 로고
    • A framework for security analysis of mobile wireless networks
    • S. Nanz and C. Hankin, "A Framework for Security Analysis of Mobile Wireless Networks," Theoretical Computer Science, vol. 367, no. 1-2, pp. 203-227, 2006.
    • (2006) Theoretical Computer Science , vol.367 , Issue.1-2 , pp. 203-227
    • Nanz, S.1    Hankin, C.2
  • 22
    • 37149042964 scopus 로고    scopus 로고
    • A calculus for mobile ad hoc networks
    • ser. LNCS, Springer-Verlag
    • J. Godskesen, "A Calculus for Mobile Ad Hoc Networks," in Proceedings of Coordination'97, ser. LNCS, vol. 4467. Springer-Verlag, 2007, pp. 132-150.
    • (2007) Proceedings of Coordination'97 , vol.4467 , pp. 132-150
    • Godskesen, J.1
  • 23
    • 26444574670 scopus 로고    scopus 로고
    • Tinysec: A link layer security architecture for wireless sensor networks
    • ACM
    • C. Karlof, N. Sastry, and D. Wagner, "Tinysec: a link layer security architecture for wireless sensor networks," in Proceedings of SenSys'04. ACM, 2004, pp. 162-175.
    • (2004) Proceedings of SenSys'04 , pp. 162-175
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 26
    • 78650468457 scopus 로고    scopus 로고
    • Formal analysis of Sensor Network Encryption Protocol (SNEP)
    • IEEE CS
    • L. Tobarra, D. Cazorla, and F. Cuartero, "Formal Analysis of Sensor Network Encryption Protocol (SNEP)," in Proceedings of WSNS 2007. IEEE CS, 2007.
    • (2007) Proceedings of WSNS 2007
    • Tobarra, L.1    Cazorla, D.2    Cuartero, F.3
  • 28
    • 70350580898 scopus 로고    scopus 로고
    • On the unobservability of a trust relation in mobile ad hoc networks
    • ser. Lecture Notes in Computer Science, Springer
    • M. Heen, G. Guette, and T. Genet, "On the Unobservability of a Trust relation in Mobile Ad Hoc Networks," in Proceedings of WISTP'09, ser. Lecture Notes in Computer Science, vol. 5746. Springer, 2009, pp. 1-11.
    • (2009) Proceedings of WISTP'09 , vol.5746 , pp. 1-11
    • Heen, M.1    Guette, G.2    Genet, T.3
  • 29
    • 77957579306 scopus 로고    scopus 로고
    • Modeling and verifying ad hoc routing protocols
    • IEEE Computer Society Press
    • M. Arnaud, V. Cortier, and S. Delaune, "Modeling and Verifying Ad Hoc Routing Protocols," in Proceedings of CSF'10. IEEE Computer Society Press, 2010.
    • (2010) Proceedings of CSF'10
    • Arnaud, M.1    Cortier, V.2    Delaune, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.