Abstract: Security analysis of ad hoc routing protocols in an adversarial environment is a challenging task. The paper utilizes Event-B to model and verify the Secure Routing Protocol (SRP), a secure ...
Abstract: IoT applications based on wireless sensor networks are mostly plagued by end-to-end delays, packet loss during transmission, and shortened sensor node lifetimes owing to energy loss. To ...