RAEED: A formally verified solution to resolve sinkhole attack in Wireless Sensor Network
暂无分享,去创建一个
[1] K. Saghar,et al. Gossip routing protocol for forest fire detection using wireless sensor networks , 2015, 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
[2] A. Ihsan,et al. Analysis of LEACH protocol(s) using formal verification , 2015, 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
[3] Ahmed Bouridane,et al. Application of formal modeling to detect black hole attacks in wireless sensor network routing protocols , 2014, Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th - 18th January, 2014.
[4] Ahmed Bouridane,et al. RAEED: A solution for hello flood attack , 2015, 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
[5] Gregorio Díaz,et al. Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP , 2007 .
[6] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[7] Todd R. Andel,et al. Automated Evaluation of Secure Route Discovery in MANET Protocols , 2008, SPIN.
[8] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[9] David E. Culler,et al. System architecture directions for networked sensors , 2000, SIGP.
[10] Chris McDonald,et al. Circumventing Sinkholes and Wormholes in Ad-hoc Wireless Networks , 2005 .
[11] Kashif Saghar,et al. Evaluation of a sensor network node communication using formal verification , 2015, 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
[12] Ahmed Bouridane,et al. Vulnerability of insens to denial of service attacks , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[13] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[14] Hridesh Rajan,et al. Slede: a domain-specific verification framework for sensor network security protocol implementations , 2008, WiSec '08.
[15] Ahmed Bouridane,et al. Formal modelling of a robust Wireless Sensor Network routing protocol , 2010, 2010 NASA/ESA Conference on Adaptive Hardware and Systems.
[16] Kashif Saghar,et al. Formal modelling and analysis of routing protocol security in wireless sensor networks , 2009 .
[17] Llanos Tobarra,et al. Formal Analysis of Sensor Network Encryption Protocol (SNEP) , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[18] Kashif Saghar,et al. Formal modelling and analysis of denial of services attacks in wireless sensor networks , 2010 .
[19] Ahmed Bouridane,et al. Applying formal modelling to detect DoS attacks in wireless medium , 2010, 2010 7th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP 2010).