메뉴 건너뛰기




Volumn 40, Issue 3-4, 2009, Pages 91-99

Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK

Author keywords

AVISPA toolbox; Model checking; Security protocols; Wireless sensor

Indexed keywords

AVISPA TOOLBOX; COMPLEMENTARY PROTOCOLS; CONFIDENTIAL DATA; FORMAL ANALYSIS OF SECURITY PROTOCOLS; MODEL CHECKING TOOLS; SECURITY PROPERTIES; SECURITY PROTOCOLS; WIRELESS SENSOR;

EID: 78650508247     PISSN: 10184864     EISSN: 15729451     Source Type: Journal    
DOI: 10.1007/s11235-008-9131-z     Document Type: Conference Paper
Times cited : (19)

References (22)
  • 2
    • 33745824225 scopus 로고    scopus 로고
    • Symbolic and cryptographic analysis of the secure WSReliableMessaging scenario
    • L. Aceto&A. Ingólfsdóttir (Eds.). FoSSaCS. Berlin: Springer
    • Backes, M., Mödersheim, S., Pfitzmann, B., & Viganò, L. (2006). Symbolic and cryptographic analysis of the secure WSReliableMessaging scenario. In L. Aceto&A. Ingólfsdóttir (Eds.), Lecture notes in computer science: Vol. 3921. FoSSaCS (pp. 428- 445). Berlin: Springer.
    • (2006) Lecture Notes in Computer Science , vol.3921 , pp. 428-445
    • Backes, M.1    Mödersheim, S.2    Pfitzmann, B.3    Viganò, L.4
  • 4
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Bellare, M., Kilian, J., & Rogaway, P. (2000). The security of the cipher block chaining message authentication code. Journal of Computer and Systems Sciences, 61(3), 362-399.
    • (2000) Journal of Computer and Systems Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 5
    • 14844303360 scopus 로고    scopus 로고
    • Verifying policy-based security for web services
    • V. Atluri, B. Pfitzmann, & P. D. McDaniel (Eds.),. New York: Assoc. Comput. Mach
    • Bhargavan, K., Fournet, C., & Gordon, A. D. (2004). Verifying policy-based security for web services. In V. Atluri, B. Pfitzmann, & P. D. McDaniel (Eds.), ACM conference on computer and communications security (pp. 268-277). New York: Assoc. Comput. Mach.
    • (2004) ACM Conference on Computer and Communications Security , pp. 268-277
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 6
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Los Alamitos: IEEE Comput. Soc
    • Chan, H., Perrig, A., & Song, D. X. (2003). Random key predistribution schemes for sensor networks. In IEEE symposium on security and privacy (p. 197). Los Alamitos: IEEE Comput. Soc.
    • (2003) IEEE Symposium on Security and Privacy , pp. 197
    • Chan, H.1    Perrig, A.2    Song, D.X.3
  • 9
    • 0019649307 scopus 로고
    • On the security of public key protocols
    • New York: IEEE
    • Dolev, D., & Yao, A. C. C. (1981). On the security of public key protocols. In FOCS (pp. 350-357). New York: IEEE.
    • (1981) FOCS , pp. 350-357
    • Dolev, D.1    Yao, A.C.C.2
  • 10
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • V. Atluri (Ed.),. New York: Assoc. Comput. Mach
    • Eschenauer, L., & Gligor, V. (2002). A key-management scheme for distributed sensor networks. In V. Atluri (Ed.), ACM conference on computer and communications security (pp. 41-47). New York: Assoc. Comput. Mach.
    • (2002) ACM Conference on Computer and Communications Security , pp. 41-47
    • Eschenauer, L.1    Gligor, V.2
  • 12
    • 0037268614 scopus 로고    scopus 로고
    • How to prevent type flaw attacks on security protocols
    • Heather, J., Lowe, G.,&Schneider, S. (2003). How to prevent type flaw attacks on security protocols. Journal of Computer Security, 11(2), 217-244.
    • (2003) Journal of Computer Security , vol.11 , Issue.2 , pp. 217-244
    • Heather, J.1    Lowe, G.2    Schneider, S.3
  • 15
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • Lowe, G. (1998). Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6(1-2), 53-84.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 53-84
    • Lowe, G.1
  • 16
    • 33745787568 scopus 로고    scopus 로고
    • Finite-state analysis of security protocols
    • A. J. Hu & M. Y. Vardi (Eds.). CAV. Berlin: Springer
    • Mitchell, J. C. (1998). Finite-state analysis of security protocols. In A. J. Hu & M. Y. Vardi (Eds.), Lecture notes in computer science: Vol. 1427. CAV (pp. 71-76). Berlin: Springer.
    • (1998) Lecture Notes in Computer Science , vol.1427 , pp. 71-76
    • Mitchell, J.C.1
  • 19
    • 33646140557 scopus 로고    scopus 로고
    • Application of formal methods to the analysis of web services security
    • M. Bravetti, L. Kloul, & G. Zavattaro (Eds.). EPEW/WS-FM. Berlin: Springer
    • Tobarra, M. L., Cazorla, D., Cuartero, F., & Diaz, G. (2005). Application of formal methods to the analysis of web services security. In M. Bravetti, L. Kloul, & G. Zavattaro (Eds.), Lecture notes in computer science: Vol. 3670. EPEW/WS-FM (pp. 215- 229). Berlin: Springer.
    • (2005) Lecture Notes in Computer Science , vol.3670 , pp. 215-229
    • Tobarra, M.L.1    Cazorla, D.2    Cuartero, F.3    Diaz, G.4
  • 22
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • S. Jajodia, V. Atluri, & T. Jaeger (Eds.),. New York: Assoc. Comput. Mach
    • Zhu, S., Setia, S., & Jajodia, S. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks. In S. Jajodia, V. Atluri, & T. Jaeger (Eds.), ACM conference on computer and communications security (pp. 62-72). New York: Assoc. Comput. Mach.
    • (2003) ACM Conference on Computer and Communications Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.