A process algebra for timed systems
Information and Computation
SPINS: security protocols for sensor networks
Wireless Networks
A simple framework for real-time cryptographic protocol analysis with compositional proof rules
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
A framework for security analysis of mobile wireless networks
Theoretical Computer Science - Automated reasoning for security protocol analysis
TPHOLs '08 Proceedings of the 21st International Conference on Theorem Proving in Higher Order Logics
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
Journal of Automated Reasoning
An Observational Theory for Mobile Ad Hoc Networks (full version)
Information and Computation
Guide to Wireless Ad Hoc Networks
Guide to Wireless Ad Hoc Networks
An operational semantics for a calculus for wireless systems
Theoretical Computer Science
A process calculus for Mobile Ad Hoc Networks
Science of Computer Programming
A calculus for mobile ad hoc networks
COORDINATION'07 Proceedings of the 9th international conference on Coordination models and languages
Isabelle/HOL: a proof assistant for higher-order logic
Isabelle/HOL: a proof assistant for higher-order logic
A calculus for the analysis of wireless network security protocols
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Equational reasoning on ad hoc networks
FSEN'09 Proceedings of the Third IPM international conference on Fundamentals of Software Engineering
A timed calculus for wireless systems
FSEN'09 Proceedings of the Third IPM international conference on Fundamentals of Software Engineering
A semantic analysis of key management protocols for wireless sensor networks
Science of Computer Programming
Behavioural equivalences and interference metrics for mobile ad-hoc networks
Performance Evaluation
Hi-index | 0.00 |
Gorrieri and Martinelli's tGNDC is a general framework for the formal verification of security protocols in a concurrent scenario. We generalise their tGNDC schema to verify wireless network security protocols. Our generalisation relies on a simple timed broadcasting process calculus whose operational semantics is given in terms of a labelled transition system which is used to derive a standard simulation theory. We apply our tGNDC schema to perform a security analysis of LiSP, a well-known key management protocol for wireless sensor networks.