Modeling protocols for secure group communications in ad hoc networks

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Since its introduction as a communications medium, wireless technology has found broad application on the battlefield. Accompanying dramatic advances in wireless technology and the capabilities associated with small computing devices, the demand for advanced mechanisms to employ wireless technology in the battlefield continues to grow. We propose a model for deriving and reasoning about security protocols designed for battlefield use in ad hoc wireless networks. We contend that our model facilitates reasoning about protocols by integrating the communications and cryptographic aspects of battlefield group communication, and allows automated reasoning about resulting protocols. We illustrate our concept by introducing protocols to support special communication cases associated with the battlefield. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Yasinsac, A., & Davis, J. A. (2003). Modeling protocols for secure group communications in ad hoc networks. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2845, 189–202. https://doi.org/10.1007/978-3-540-39871-4_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free