Login / Signup

Formal Threat Analysis for Ad-Hoc Routing Protocol: Modelling and Checking the Sybil Attack.

Jing-Jing GuiJinshuang WangYu-sen ZhangTao Zhang
Published in: Intell. Autom. Soft Comput. (2011)
Keyphrases
  • routing protocol
  • network topology
  • wireless sensor networks
  • sensor networks
  • ad hoc networks
  • routing algorithm
  • data streams
  • energy consumption
  • data acquisition
  • mobile ad hoc networks
  • network layer