LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Saghar, Kashif; Henderson, William; Kendall, David (2009)
Languages: English
Types: Unknown
Subjects: F200
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] V. Wen D. Culler A. Perrig, R. Szewczyk and J.D. Tygar. Spins: Security protocols for sensor networks. In ACM Mobile Computing and Networking, volume 8, pages 521-534, Sep 2002.
    • [2] Todd R. Andel and Alec Yasinsac. Automated evaluation of secure route discovery in MANET protocols. In Klaus Havelund, Rupak Majumdar, and Jens Palsberg, editors, Proceedings of 15th International SPIN Workshop on Model Checking Software (SPIN 2008),Los Angeles, CA, USA, volume 5156 of Lecture Notes in Computer Science, pages 26-41. Springer, August 10-12, 2008.
    • [3] D. Braginsky and D. Estrin. Rumor routing algorithm for sensor networks. In Proceedings of the First Workshop on Sensor Networks and Applications (WSNA), Atlanta, GA, pages 22-31, October 2002.
    • [4] Songwu Liu Lixia Zhang Fan Ye, A. Chen. A scalable solution to minimum cost forwarding in large sensor networks. In Proceedings of the tenth International Conference on Computer Communications and Networks (ICCCN), Scottsdale, AZ, USA, pages 304-309, 15-17 Oct. 2001.
    • [5] Youssef Hanna, Hridesh Rajan, and Wensheng Zhang. Slede: a domainspecific verification framework for sensor network security protocol implementations. In Proceedings of the first ACM conference on Wireless network security (WISEC 2008), Alexandria, VA, USA, pages 109-118, 2008.
    • [6] Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS'00), page 223, Jan 2000.
    • [7] Gerard J. Holzmann. The SPIN Model Checker: Primer and Reference Manual. Addison Wesley, 2004.
    • [8] Chalermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin. Directed diffusion: a scalable and robust communication paradigm for sensor networks. In Mobile Computing and Networking, pages 56-67, 2000.
    • [9] R. Han J. Deng and S. Mishra. Insens: Intrusion-tolerant routing for wireless sensor networks. In Elsevier Journal on Computer Communications, Special Issue on Dependable Wireless Sensor Networks, volume 29, pages 216-230, 2005.
    • [10] S. Mishra J. Deng, R. Han. The performance evaluation of intrusiontolerant routing in wireless sensor networks. In IEEE 2nd International Workshop on Information Processing in Sensor Networks (IPSN'03), Palo Alto, CA, USA, pages 349-364, April 2003.
    • [11] C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, volume 1, pages 293-315, September 2003.
    • [12] S. Setia S. Zhu and S. Jajodia. Leap: Efficient security mechanisms for large-scale distributed sensor networks. In ACM Conference on Computer and Communications Security (CCS'03), pages 62-72, October 2003.
    • [13] Llanos Tobarra, Diego Cazorla, and Fernando Cuartero. Formal Analysis of Sensor Network Encryption Protocol (SNEP). In IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS 2007), Piscataway, NJ, USA, pages 767-772, Pisa (Italy), October 2007.
    • [14] Llanos Tobarra, Diego Cazorla, Fernando Cuartero, Gregorio Daz, and Emilia Cambronero. Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP. In Proc. of the First IFIP International Conference on Wireless Sensor and Actor Networks (WSAN'07), pages 95-106, Albacete (Spain), September, 2007. IFIP Main Series, Springer.
    • [15] A.D. Wood and J.A. Stankovic. Denial of service in sensor networks. In IEEE Computer, volume 35, pages 54-62, Sep 2002.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article