Modeling and verifying ad hoc routing protocols
From MaRDI portal
Publication:462483
DOI10.1016/J.IC.2014.07.004zbMATH Open1360.68199OpenAlexW2044186122MaRDI QIDQ462483FDOQ462483
Authors: Mathilde Arnaud, Véronique Cortier, Stéphanie Delaune
Publication date: 20 October 2014
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2014.07.004
Recommendations
- Modelling and verifying the AODV routing protocol
- Modeling Routing Protocols in Adhoc Networks
- Modeling and efficient verification of wireless ad hoc networks
- Formal Techniques for Networked and Distributed Systems – FORTE 2004
- scientific article; zbMATH DE number 1982205
- Formal Techniques for Networked and Distributed Systems - FORTE 2005
- Model checking mobile ad hoc networks
- Query-Based Model Checking of Ad Hoc Network Protocols
Cites Work
- SPINS: Security protocols for sensor networks
- Computer Aided Verification
- Mobile values, new names, and secure communication
- A framework for security analysis of mobile wireless networks
- On the symbolic reduction of processes with cryptographic functions.
- Deciding security properties for cryptographic protocols. application to key cycles
Cited In (23)
- Authenticated ad hoc routing at the link layer for mobile systems
- Formal verification of secure ad hoc routing protocols using AVISPA: ARAN case study
- Verification of correspondence assertions in a calculus for mobile ad hoc networks
- Prevention of Tunneling Attack in endairA
- Intercepting blackhole attacks in MANETs: an ASM-based model
- Applied Cryptography and Network Security
- Analyzing Internet Routing Security Using Model Checking
- Epistemic Cord logic: verifying anonymous routing protocols in Ad Hoc network
- Modeling Routing Protocols in Adhoc Networks
- Information Security Practice and Experience
- Graph Grammar Modeling and Verification of Ad Hoc Routing Protocols
- A framework for security analysis of mobile wireless networks
- A novel NP-based security scheme for AODV routing protocol
- Formal Techniques for Networked and Distributed Systems - FORTE 2005
- Parameterized verification of time-sensitive models of ad hoc network protocols
- Tools and Methods for RTCP-Nets Modeling and Verification
- Malicious attacks on ad hoc network routing protocols
- Analysing routing protocols: four nodes topologies are sufficient
- Formal analysis of privacy for routing protocols in mobile ad hoc networks
- Secure node discovery in ad-hoc networks and applications
- Model checking mobile ad hoc networks
- Resist SRP against wormhole attack
- Information and Communications Security
Uses Software
This page was built for publication: Modeling and verifying ad hoc routing protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q462483)