[PDF][PDF] Modeling and formal verification of implicit on-demand secure ad hoc routing protocols in HLPSL and AVISPA

M Pura, V Patriciu, I Bica - International Journal of Computers …, 2009 - universitypress.org.uk
Ad hoc networks are a relatively new and promising communication technology. Its key
aspect is represented by the specific routing protocols that assure the ad hoc manner of inter …

How to specify and how to prove correctness of secure routing protocols for MANET

P Papadimitratos, ZJ Haas… - 2006 3rd International …, 2006 - ieeexplore.ieee.org
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it
has been unclear what are the properties they achieve, as a formal analysis of these …

[PDF][PDF] Formal verification of secure ad hoc routing protocols using AVISPA: ARAN case study

ML Pura, VV Patriciu, I Bica - … of the 4th Conference on European …, 2010 - researchgate.net
Formal verification through model checking proved to be a very useful validation technique
for security protocols: authentication, key agreement, non-repudiation, confidentiality, etc …

[PDF][PDF] Secure routing for mobile ad hoc networks.

PG Argyroudis, D O'mahony - IEEE Commun. Surv. Tutorials, 2005 - Citeseer
In this paper we present a survey of secure ad hoc routing protocols for mobile wireless
networks. A mobile ad hoc network is a collection of nodes that is connected through a …

[HTML][HTML] Modeling and verifying ad hoc routing protocols

M Arnaud, V Cortier, S Delaune - Information and Computation, 2014 - Elsevier
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize
their infrastructure. In such networks, a central issue, addressed by routing protocols, is to …

Provably secure on-demand source routing in mobile ad hoc networks

G Acs, L Buttyan, I Vajda - IEEE transactions on Mobile …, 2006 - ieeexplore.ieee.org
Routing is one of the most basic networking functions in mobile ad hoc networks. Hence, an
adversary can easily paralyze the operation of the network by attacking the routing protocol …

[PDF][PDF] Adaptive secure routing in ad hoc mobile network

ARM Kamal - Master of Science Thesis, Department of Computer and …, 2004 - Citeseer
Secure routing in ad hoc network is a daunting task because of some contradictions
between the nature of the network and the associated applications. In this work various …

Secure Routing Technique in MANET: A Review

A Chandrakar, R Sarkar - … , Networking, and Informatics: Proceedings of the …, 2014 - Springer
We are here to introduce the different approach that prevents security threat in MANET
routing protocol. In recent year, secure routing protocol has been extensively studied. A …

[PDF][PDF] Security vulnerabilities in mobile ad hoc networks

V Nassa - International Journal of Science Technology and … - researchgate.net
Science and technology play a vital role in the present fast-growing world. In recent years,
pervasive computing has enjoyed a tremendous rise in popularity. Here some security …

Cryptanalysis of secure routing among authenticated nodes in manets

R Ranjan - Proceedings of the 5th International Conference on …, 2017 - Springer
Secure routing (SR) is one of the most important issues in Mobile Ad hoc Networks
(MANETs). Recently, in 2013, Zhao et al. proposed an efficient routing integrated framework …