[HTML][HTML] Satellite-based communications security: A survey of threats, solutions, and research challenges

P Tedeschi, S Sciancalepore, R Di Pietro - Computer Networks, 2022 - Elsevier
Satellite-based Communication (SATCOM) systems are gaining renewed momentum in
Industry and Academia, thanks to innovative services introduced by leading tech companies …

Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …

LTEInspector: A systematic approach for adversarial testing of 4G LTE

S Hussain, O Chowdhury, S Mehnaz… - Network and Distributed …, 2018 - par.nsf.gov
In this paper, we investigate the security and privacy of the three critical procedures of the
4G LTE protocol (ie, attach, detach, and paging), and in the process, uncover potential …

5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol

SR Hussain, M Echeverria, I Karim… - Proceedings of the …, 2019 - dl.acm.org
The paper proposes 5GReasoner, a framework for property-guided formal verification of
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …

2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET

F Wang, Y Xu, H Zhang, Y Zhang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Authentication in a vehicular ad-hoc network (VANET) requires not only secure and efficient
authentication with privacy preservation but applicable flexibility to handle complicated …

The applied pi calculus: Mobile values, new names, and secure communication

M Abadi, B Blanchet, C Fournet - Journal of the ACM (JACM), 2017 - dl.acm.org
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …

[PDF][PDF] ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial

B Blanchet, B Smyth, V Cheval… - Version from, 2018 - bblanche.gitlabpages.inria.fr
This manual describes the ProVerif software package version 2.05. ProVerif is a tool for
automatically analyzing the security of cryptographic protocols. Support is provided for, but …

Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network

X Li, Y Wang, P Vijayakumar, D He… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A dynamic group key is required for secure communication in the Unmanned Aerial Vehicles
Ad-Hoc Network (UAANET). However, due to the unreliable wireless channel and high …