Verification of A Security Adaptive Protocol Suite Using SPIN.
Shamim RiponSumaya MahbubK. M. Imtiaz-Ud-DinPublished in: CoRR (2014)
Keyphrases
- sensor networks
- key establishment
- cryptographic protocols
- protocol specification
- wireless sensor networks
- security properties
- formal analysis
- high security
- ban logic
- security protocols
- authentication protocol
- denial of service attacks
- key agreement protocol
- java card
- secure multiparty computation
- security analysis
- key exchange protocol
- information security
- communication protocols
- intrusion detection
- mobile payment
- distributed systems
- network security
- security services
- physical layer
- key distribution
- communication protocol
- standard model
- statistical databases
- network layer
- diffie hellman
- model checking
- electronic voting
- key agreement
- access control
- security requirements
- integrity verification
- security issues
- secure routing