Analysis of provably secure on-demand source routing in MANET
A formal model tailored to the security analysis of on-demand source routing protocols in MANET was analyzed, and the improper manipulations such as mergence of the adjacent adversarial nodes in the model and the flaw in the proof for endairA were indicated. A new hidden channel attack to endairA wa...
Saved in:
Main Authors: | MAO Li-qiang1, MA Jian-feng1, LI Xing-hua1 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74651870/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Provable secure digital watermarking scheme
Published: (2008-01-01) -
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
by: Zhi-yan XU, et al.
Published: (2017-07-01) -
Correcting the security definition of the Bellare-Rogaway 3PKD model
by: LIU Jun1, et al.
Published: (2007-01-01) -
Provably secure secret sharing scheme based on bilinear maps
by: LI Hui-xian1, et al.
Published: (2008-01-01) -
Provable secure trusted protocol for network storage
by: DUAN Xin-dong, et al.
Published: (2011-01-01)