Have a personal or library account? Click to login
Formal analysis of security protocols for wireless sensor networks Cover

Formal analysis of security protocols for wireless sensor networks

Open Access
|Nov 2012

References

  1. [1] ABADI, M. - FOURNET, C.: Mobile values, new names, and secure communication, in: Proc. of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ACM SIGPLAN Notices, Vol. 36, ACM, New York, 2001, pp. 104-115.10.1145/373243.360213
  2. [2] ABADI, M. - GORDON, A. D.: A calculus for cryptographic protocols: the spi calculus, in: Proc. of the 4th ACM Conf. on Computer and Communications Security-CCS ’97, ACM, New York, 1997, pp. 36-47.10.1145/266420.266432
  3. [3] ARMANDO, A. ET AL.: The AVISPA tool for the automated validation of internet security protocols and applications, in: Proc. of the 17th Internat. Conf. on Computer Aided Verification-CAV ’05 (K. Etessami et al., eds.), Lect. Notes Comput. Sci., Vol. 3576, Springer, Berlin, 2005, pp. 281-285.
  4. [4] BLANCHET, B.: Automatic verification of correspondences for security protocols, J. Comput. Secur. 17 (2009), 363-434.10.3233/JCS-2009-0339
  5. [5] BLANCHET, B.: An efficient cryptographic protocol verifier based on prolog rules, in: Proc. of 14th IEEE Computer Security Foundations Workshop-CSFW ’01, IEEE Comput. Soc., Washington, 2001, pp. 82-96.
  6. [6] GOLLMANN, D.: Protocol analysis for concrete environments, in: Proc. of the 10th Internat. Conf. on Computer Aided Systems Theory-EUROCAST ’05 (R. Moreno-D´ıaz et al., eds.), Lect. Notes Comput. Sci., Vol. 3643, Springer, Berlin, 2005, pp. 365-372.
  7. [7] MENEZES, A. - VAN OORSHOT, P. - VANSTONE, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, 1997.
  8. [8] TOBARRA, L. ET AL.: Model checking wireless sensor network security protocols: Tiny- Sec + LEAP, in: Proc. of IFIP WG 6.8 1st Internat. Conf. on Wireless Sensor and Actor Networks-WSAN ’07 (L. Orozco-Barbosa et al., eds.), IFIP Adv. Inform. Commun. Technol., Vol. 248, Springer, Berlin, 2008, pp. 95-106.10.1007/978-0-387-74899-3_9
  9. [9] VOGT, H.: Exploring message authentication in sensor networks, in: Proc. of the 1st EuropeanWorkshop on Security in Ad-hoc and Sensor Networks-ESAS ’04 (C. Castelluccia et al., eds.), Lect. Notes Comput. Sci., Vol. 3313, Springer, Berlin, 2005, pp. 19-30.
  10. [10] VOGT, H.: Increasing attack resiliency of wireless ad hoc and sensor networks, in: Proc. of the 2nd Internat. Workshop on Security in Distributed Comput. Systems-ICDCSW ’05, Vol. 2., IEEE Computer Society, Washington, 2005, pp. 179-184.
  11. [11] VOGT, H.: Integrity preservation for communication in sensor networks, Tech. Report 434, Institute for Pervasive Computing, ETH Z¨urich, 2004.
  12. [12] DU, X.-XIAO, Y.: A survey on sensor network security, in: Wireless Sensor Networks and Applications (Li, Y., et al., eds.), Signals and Communication Technology Series, New York, 2008, pp. 403-421.10.1007/978-0-387-49592-7_17
DOI: https://doi.org/10.2478/v10127-010-0032-7 | Journal eISSN: 1338-9750 | Journal ISSN: 12103195
Language: English
Page range: 81 - 97
Published on: Nov 13, 2012
Published by: Slovak Academy of Sciences, Mathematical Institute
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2012 Marián Novotný, published by Slovak Academy of Sciences, Mathematical Institute
This work is licensed under the Creative Commons License.