Ad-hoc networks do not rely on a pre-installed infrastructure, but they are formed by end-user devices in a self-organized manner. A consequence of this principle is that end-user devices must also perform routing functions. However, end-user devices can easily be compromised, and they may not follow the routing protocol faithfully. Such compromised and misbehaving nodes can disrupt routing, and hence, disable the operation of the network. In order to cope with this problem, several secured routing protocols have been proposed for ad-hoc networks. However, many of them have design flaws that still make them vulnerable to attacks mounted by compromised nodes. In this paper, we propose a formal verification method for secure ad-hoc network ro...
Routing is one of the most basic networking functions in mobile ad hoc networks. Hence, an adversary...
Mobile ad hoc network is an autonomous collection of mobile or stationary nodes communicating with e...
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been u...
Ad-hoc networks do not rely on a pre-installed infrastructure, but they are formed by end-user devic...
Ad-hoc networks do not rely on a pre-installed infrastructure, but they are formed by end-user devic...
International audienceMany cryptographic protocols aim at ensuring the route validity in ad-hoc netw...
Many cryptographic protocols aim at ensuring the route validity in ad-hoc networks, i.e. the establi...
International audienceMobile ad hoc networks consist of mobile wireless devices which autonomously o...
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastr...
To appearInternational audienceMobile ad hoc networks consist of mobile wireless devices which auton...
AbstractIn ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for eac...
Abstract—Several different secure routing protocols have been proposed for determining the appropria...
We propose a formal framework for the security analysis of on-demand source routing protocols for wi...
Abstract—Several different secure routing protocols have been proposed for determining the appropria...
Secure mobile ad hoc network (MANET) routing protocols are not tested thoroughly against their secur...
Routing is one of the most basic networking functions in mobile ad hoc networks. Hence, an adversary...
Mobile ad hoc network is an autonomous collection of mobile or stationary nodes communicating with e...
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been u...
Ad-hoc networks do not rely on a pre-installed infrastructure, but they are formed by end-user devic...
Ad-hoc networks do not rely on a pre-installed infrastructure, but they are formed by end-user devic...
International audienceMany cryptographic protocols aim at ensuring the route validity in ad-hoc netw...
Many cryptographic protocols aim at ensuring the route validity in ad-hoc networks, i.e. the establi...
International audienceMobile ad hoc networks consist of mobile wireless devices which autonomously o...
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastr...
To appearInternational audienceMobile ad hoc networks consist of mobile wireless devices which auton...
AbstractIn ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for eac...
Abstract—Several different secure routing protocols have been proposed for determining the appropria...
We propose a formal framework for the security analysis of on-demand source routing protocols for wi...
Abstract—Several different secure routing protocols have been proposed for determining the appropria...
Secure mobile ad hoc network (MANET) routing protocols are not tested thoroughly against their secur...
Routing is one of the most basic networking functions in mobile ad hoc networks. Hence, an adversary...
Mobile ad hoc network is an autonomous collection of mobile or stationary nodes communicating with e...
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been u...