Modeling and verifying ad hoc routing protocols
From MaRDI portal
(Redirected from Publication:462483)
Recommendations
- Modelling and verifying the AODV routing protocol
- Modeling Routing Protocols in Adhoc Networks
- Modeling and efficient verification of wireless ad hoc networks
- Formal Techniques for Networked and Distributed Systems – FORTE 2004
- scientific article; zbMATH DE number 1982205
- Formal Techniques for Networked and Distributed Systems - FORTE 2005
- Model checking mobile ad hoc networks
- Query-Based Model Checking of Ad Hoc Network Protocols
Cites work
- A framework for security analysis of mobile wireless networks
- Computer Aided Verification
- Deciding security properties for cryptographic protocols. application to key cycles
- Mobile values, new names, and secure communication
- On the symbolic reduction of processes with cryptographic functions.
- SPINS: Security protocols for sensor networks
Cited in
(23)- Formal analysis of privacy for routing protocols in mobile ad hoc networks
- Formal verification of secure ad hoc routing protocols using AVISPA: ARAN case study
- Secure node discovery in ad-hoc networks and applications
- Verification of correspondence assertions in a calculus for mobile ad hoc networks
- Applied Cryptography and Network Security
- Formal Techniques for Networked and Distributed Systems - FORTE 2005
- Analysing routing protocols: four nodes topologies are sufficient
- A framework for security analysis of mobile wireless networks
- Analyzing Internet Routing Security Using Model Checking
- Model checking mobile ad hoc networks
- Tools and Methods for RTCP-Nets Modeling and Verification
- Authenticated ad hoc routing at the link layer for mobile systems
- Parameterized verification of time-sensitive models of ad hoc network protocols
- Epistemic Cord logic: verifying anonymous routing protocols in Ad Hoc network
- A novel NP-based security scheme for AODV routing protocol
- Resist SRP against wormhole attack
- Information Security Practice and Experience
- Intercepting blackhole attacks in MANETs: an ASM-based model
- Graph Grammar Modeling and Verification of Ad Hoc Routing Protocols
- Malicious attacks on ad hoc network routing protocols
- Information and Communications Security
- Modeling Routing Protocols in Adhoc Networks
- Prevention of Tunneling Attack in endairA
This page was built for publication: Modeling and verifying ad hoc routing protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q462483)