Accès libre

Formal analysis of security protocols for wireless sensor networks

À propos de cet article

[1] ABADI, M. - FOURNET, C.: Mobile values, new names, and secure communication, in: Proc. of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ACM SIGPLAN Notices, Vol. 36, ACM, New York, 2001, pp. 104-115.10.1145/373243.360213Search in Google Scholar

[2] ABADI, M. - GORDON, A. D.: A calculus for cryptographic protocols: the spi calculus, in: Proc. of the 4th ACM Conf. on Computer and Communications Security-CCS ’97, ACM, New York, 1997, pp. 36-47.10.1145/266420.266432Search in Google Scholar

[3] ARMANDO, A. ET AL.: The AVISPA tool for the automated validation of internet security protocols and applications, in: Proc. of the 17th Internat. Conf. on Computer Aided Verification-CAV ’05 (K. Etessami et al., eds.), Lect. Notes Comput. Sci., Vol. 3576, Springer, Berlin, 2005, pp. 281-285.Search in Google Scholar

[4] BLANCHET, B.: Automatic verification of correspondences for security protocols, J. Comput. Secur. 17 (2009), 363-434.10.3233/JCS-2009-0339Search in Google Scholar

[5] BLANCHET, B.: An efficient cryptographic protocol verifier based on prolog rules, in: Proc. of 14th IEEE Computer Security Foundations Workshop-CSFW ’01, IEEE Comput. Soc., Washington, 2001, pp. 82-96.Search in Google Scholar

[6] GOLLMANN, D.: Protocol analysis for concrete environments, in: Proc. of the 10th Internat. Conf. on Computer Aided Systems Theory-EUROCAST ’05 (R. Moreno-D´ıaz et al., eds.), Lect. Notes Comput. Sci., Vol. 3643, Springer, Berlin, 2005, pp. 365-372.Search in Google Scholar

[7] MENEZES, A. - VAN OORSHOT, P. - VANSTONE, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, 1997.Search in Google Scholar

[8] TOBARRA, L. ET AL.: Model checking wireless sensor network security protocols: Tiny- Sec + LEAP, in: Proc. of IFIP WG 6.8 1st Internat. Conf. on Wireless Sensor and Actor Networks-WSAN ’07 (L. Orozco-Barbosa et al., eds.), IFIP Adv. Inform. Commun. Technol., Vol. 248, Springer, Berlin, 2008, pp. 95-106.10.1007/978-0-387-74899-3_9Search in Google Scholar

[9] VOGT, H.: Exploring message authentication in sensor networks, in: Proc. of the 1st EuropeanWorkshop on Security in Ad-hoc and Sensor Networks-ESAS ’04 (C. Castelluccia et al., eds.), Lect. Notes Comput. Sci., Vol. 3313, Springer, Berlin, 2005, pp. 19-30.Search in Google Scholar

[10] VOGT, H.: Increasing attack resiliency of wireless ad hoc and sensor networks, in: Proc. of the 2nd Internat. Workshop on Security in Distributed Comput. Systems-ICDCSW ’05, Vol. 2., IEEE Computer Society, Washington, 2005, pp. 179-184.Search in Google Scholar

[11] VOGT, H.: Integrity preservation for communication in sensor networks, Tech. Report 434, Institute for Pervasive Computing, ETH Z¨urich, 2004.Search in Google Scholar

[12] DU, X.-XIAO, Y.: A survey on sensor network security, in: Wireless Sensor Networks and Applications (Li, Y., et al., eds.), Signals and Communication Technology Series, New York, 2008, pp. 403-421.10.1007/978-0-387-49592-7_17Search in Google Scholar

ISSN:
1210-3195
Langue:
Anglais
Périodicité:
3 fois par an
Sujets de la revue:
Mathematics, General Mathematics