2013
DOI: 10.1007/978-3-642-38613-8_28
|View full text |Cite
|
Sign up to set email alerts
|

Broadcast, Denial-of-Service, and Secure Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
26
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 25 publications
(26 citation statements)
references
References 22 publications
0
26
0
Order By: Relevance
“…The broadcast Quality Calculus of [29] deals with the problem of denial-ofservice by means of selective input actions. It inspects the structure of messages by associating specific contracts to inputs, but does not provide any mean to change the input contracts during execution.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…The broadcast Quality Calculus of [29] deals with the problem of denial-ofservice by means of selective input actions. It inspects the structure of messages by associating specific contracts to inputs, but does not provide any mean to change the input contracts during execution.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Vigo et al [37] proposed a calculus for wireless-based cyber-physical (CPS) systems endowed with a theory that allows modelling and reasoning about cryptographic primitives, together with explicit notions of communication failure and unwanted communication. One of the main goal of the paper is a faithful representation denial-of-service.…”
Section: Conclusion Related and Future Workmentioning
confidence: 99%
“…It also lacks a clear distinction between physical components (sensor and actuators) and logical ones (processes). Compared to [37], paper [39] introduces a static network topology and enrich the theory with an harmony theorem.…”
Section: Conclusion Related and Future Workmentioning
confidence: 99%
“…They are [10], [11], and [12], as discussed next. Each builds on the Quality Calculus [9], a process algebra in the family of CCS and the π-calculus, intended to study the behaviour of software components in distributed systems when the communication has vulnerabilities; similar to the type of system considered at the end of this paper.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, one motivation for the Quality Calculus is seeking to ensure that messages are correctly received, and denial of service attacks are a major challenge in this context. In [10], the authors introduce the Applied Quality Calculus which extends the Quality Calculus. The Applied Quality Calculus is used in modelling secure systems which must operate in the context of low computational power devices which communicate by broadcast communication in a challenging computational context where communication failures cannot be ignored.…”
Section: Related Workmentioning
confidence: 99%