Abstract: Security analysis of ad hoc routing protocols in an adversarial environment is a challenging task. The paper utilizes Event-B to model and verify the Secure Routing Protocol (SRP), a secure ...
Abstract: IoT applications based on wireless sensor networks are mostly plagued by end-to-end delays, packet loss during transmission, and shortened sensor node lifetimes owing to energy loss. To ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results