期刊
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
卷 9, 期 4, 页码 70-84出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/COMST.2007.4444751
关键词
-
资金
- U.S. Air Force
- U.S. Army Research Laboratory
- U.S. Army Research Office [W91NF-04-1-0415]
Secure routing protocols for mobile ad hoc networks are vital to proper wireless network operation. Unfortunately, ad hoc protocol security properties are often unknown and difficult to analyze. Non-exhaustive analysis techniques may deem a protocol secure, while in reality an unobvious or subtle flaw may be present. Using exhaustive analysis techniques to prove (or disprove) security properties increases protocol confidence. We provide a survey on the current state of analysis techniques, as they are used in the mobile ad hoc routing community and further discuss open research areas.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据