Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols
Open Access
- 22 February 2008
- journal article
- Published by Elsevier BV in Electronic Notes in Theoretical Computer Science
- Vol. 197 (2), 3-14
- https://doi.org/10.1016/j.entcs.2007.12.013
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Formal Security Analysis for Ad-Hoc NetworksElectronic Notes in Theoretical Computer Science, 2006
- Limitations of on demand secure routing protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc NetworksWireless Networks, 2005
- Secure routing for mobile ad hoc networksIEEE Communications Surveys & Tutorials, 2005
- Towards provable security for ad hoc routing protocolsPublished by Association for Computing Machinery (ACM) ,2004
- Packet leashes: a defense against wormhole attacks in wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- The Sybil AttackLecture Notes in Computer Science, 2002
- Mitigating routing misbehavior in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2000
- A review of current routing protocols for ad hoc mobile wireless networksIEEE Wireless Communications, 1999
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983