Many cryptographic protocols aim at ensuring the route validity in ad-hoc networks, i.e. the established route representing an exists path in the network. However, flaws have been found in some protocols that are claimed secure (e.g. the attack on SRP applied to DSR). Some formal models and reduction proofs have been proposed to give more guarantees when verifying route validity and facilitate verification process. The existing approaches assume the cooperative attacker model. In this paper, we consider the non-cooperative attacker model, and we show that verifying the route validity under the non-cooperative model requires to verify only five topologies, each containing four nodes, and to consider only three malicious (compromised) nodes. ...
The emergence of the Mobile Ad Hoc Networking (MANET) technology advocates self-organized wireless i...
Abstract—Several different secure routing protocols have been proposed for determining the appropria...
Network protocol construction is a complex and error prone task. The challenges originate both from...
International audienceMany cryptographic protocols aim at ensuring the route validity in ad-hoc netw...
Ad-hoc networks do not rely on a pre-installed infrastructure, but they are formed by end-user devic...
International audienceMobile ad hoc networks consist of mobile wireless devices which autonomously o...
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastr...
To appearInternational audienceMobile ad hoc networks consist of mobile wireless devices which auton...
The original publication is available at www.springerlink.comInternational audienceRouting protocols...
Abstract. Routing protocols aim at establishing a route between nodes on a network. Secured versions...
Secure mobile ad hoc network (MANET) routing protocols are not tested thoroughly against their secur...
We propose a formal framework for the security analysis of on-demand source routing protocols for wi...
Today\u27s wireless networks rely mostly on infrastructural support for their operation. With the co...
Nodes taking part in mobile ad hoc networks (MANET) are expected to adhere to the rules dictated by ...
Mobile ad hoc network is an autonomous collection of mobile or stationary nodes communicating with e...
The emergence of the Mobile Ad Hoc Networking (MANET) technology advocates self-organized wireless i...
Abstract—Several different secure routing protocols have been proposed for determining the appropria...
Network protocol construction is a complex and error prone task. The challenges originate both from...
International audienceMany cryptographic protocols aim at ensuring the route validity in ad-hoc netw...
Ad-hoc networks do not rely on a pre-installed infrastructure, but they are formed by end-user devic...
International audienceMobile ad hoc networks consist of mobile wireless devices which autonomously o...
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastr...
To appearInternational audienceMobile ad hoc networks consist of mobile wireless devices which auton...
The original publication is available at www.springerlink.comInternational audienceRouting protocols...
Abstract. Routing protocols aim at establishing a route between nodes on a network. Secured versions...
Secure mobile ad hoc network (MANET) routing protocols are not tested thoroughly against their secur...
We propose a formal framework for the security analysis of on-demand source routing protocols for wi...
Today\u27s wireless networks rely mostly on infrastructural support for their operation. With the co...
Nodes taking part in mobile ad hoc networks (MANET) are expected to adhere to the rules dictated by ...
Mobile ad hoc network is an autonomous collection of mobile or stationary nodes communicating with e...
The emergence of the Mobile Ad Hoc Networking (MANET) technology advocates self-organized wireless i...
Abstract—Several different secure routing protocols have been proposed for determining the appropria...
Network protocol construction is a complex and error prone task. The challenges originate both from...