Towards formal verification of IoT protocols: A Review

K Hofer-Schmitz, B Stojanović - Computer Networks, 2020 - Elsevier
Formal Verification is one of the crucial methods to detect possible weaknesses and
vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety …

A taxonomy of DDoS attack and DDoS defense mechanisms

J Mirkovic, P Reiher - ACM SIGCOMM Computer Communication …, 2004 - dl.acm.org
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety
of both the attacks and the defense approaches is overwhelming. This paper presents two …

DDoS attacks and defense mechanisms: classification and state-of-the-art

C Douligeris, A Mitrokotsa - Computer networks, 2004 - Elsevier
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest
security problems in today's Internet. Of particular concern are Distributed Denial of Service …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Practical network support for IP traceback

S Savage, D Wetherall, A Karlin… - Proceedings of the …, 2000 - dl.acm.org
This paper describes a technique for tracing anonymous packet flooding attacks in the
Internet back towards their source. This work is motivated by the increased frequency and …

[图书][B] Handbook of sensor networks: compact wireless and wired sensing systems

M Ilyas, I Mahgoub - 2004 - taylorfrancis.com
As the field of communications networks continues to evolve, the challenging area of
wireless sensor networks is rapidly coming of age. Recent advances have made it possible …

Advanced and authenticated marking schemes for IP traceback

DX Song, A Perrig - … . Twentieth Annual Joint Conference of the …, 2001 - ieeexplore.ieee.org
Defending against distributed denial-of-service attacks is one of the hardest security
problems on the Internet today. One difficulty to thwart these attacks is to trace the source of …

On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets

K Park, H Lee - ACM SIGCOMM computer communication review, 2001 - dl.acm.org
Denial of service (DoS) attack on the Internet has become a pressing problem. In this paper,
we describe and evaluate route-based distributed packet filtering (DPF), a novel approach to …

Network support for IP traceback

S Savage, D Wetherall, A Karlin… - IEEE/ACM transactions …, 2001 - ieeexplore.ieee.org
This paper describes a technique for tracing anonymous packet flooding attacks in the
Internet back toward their source. This work is motivated by the increased frequency and …

DOS-resistant authentication with client puzzles

T Aura, P Nikander, J Leiwo - International workshop on security protocols, 2000 - Springer
Denial of service by server resource exhaustion has become a major security threat in open
communications networks. Public-key authentication does not completely protect against the …