SPINS: security protocols for sensor networks
Wireless Networks
SCUBA: Secure Code Update By Attestation in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
The emergence of networking abstractions and techniques in TinyOS
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Castor: Secure Code Updates Using Symmetric Cryptosystems
RTSS '07 Proceedings of the 28th IEEE International Real-Time Systems Symposium
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Formal verification and simulation for performance analysis for probabilistic broadcast protocols
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Authenticated in-network programming for wireless sensor networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Quantitative refinement and model checking for the analysis of probabilistic systems
FM'06 Proceedings of the 14th international conference on Formal Methods
PRISM: a tool for automatic verification of probabilistic systems
TACAS'06 Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems
A survey of transport protocols for wireless sensor networks
IEEE Network: The Magazine of Global Internetworking
Access control in multi-party wireless sensor networks
EWSN'13 Proceedings of the 10th European conference on Wireless Sensor Networks
Hi-index | 0.00 |
We consider the problem of authenticated query dissemination in sensor networks, where each sensor node should be able to decide whether the query was injected into the network by a legitimate entity (e.g., the base station), or by an adversary that tries to gain unauthorized access to the sensor data. We present sAQF, an improved variant of the AQF protocol by Benenson et al. [2] and verify its correctness by means of a model based on probabilistic action systems.