Symbolic Model Checking of Security Protocols for Ad hoc Networks on any Topologies

Author(s):  
Mihai Lica Pura ◽  
Didier Buchs
Author(s):  
Irfan Zakiuddin ◽  
Michael Goldsmith ◽  
Paul Whittaker ◽  
Paul Gardiner

2016 ◽  
Vol 49 (3) ◽  
pp. 159-189 ◽  
Author(s):  
Fatemeh Ghassemi ◽  
Wan Fokkink

Author(s):  
Muhammad Mahmudul Islam ◽  
Ronald Pose ◽  
Carlo Kopp

Due to the nature of wireless media, dynamic network topology, resource constraints, and lack of any base station or access point, security in ad-hoc networks is more challenging than with cabled networks. In this chapter, we discuss various attacks on the network layer of ad-hoc networks. We also review security protocols that protect network layer operations from various attacks.


Sign in / Sign up

Export Citation Format

Share Document