2020
DOI: 10.1002/dac.4275
|View full text |Cite
|
Sign up to set email alerts
|

Formal verification of a new authenticated and optimized version of AOMDV for WSN

Abstract: Summary In this paper, we propose a formal study based on model checking to formally verify an enhancement authenticated version of ad hoc on‐demand multipath distance vector (AOMDV) called authenticated optimized AOMDV (AO‐AOMDV). In this new version, we have added new functionalities in route discovery and route maintenance processes combined with the advantages of μTESLA. This contribution allows a transmitter to compute multiple authenticated routing paths toward the destination. The result of the formal v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 33 publications
0
1
0
Order By: Relevance
“…The data will be sent to a research center for analysis to decide whenever the structure needs any maintenance. Moreover, µTESLA was used to create functionalities in route discovery and maintenance procedures for WSN authentication in (Djellouli et al, 2020) and in ) STEADY-µTESLA protocol has been proposed to secure for data quality and credibility in WSNs in cluster-based. Da Conceicao et al ( 2017) used μTESLA protocol to secure and authenticate information communication exchange in vehicular networks.…”
Section: Analysis and Applications For Broadcast Authentication Protocolsmentioning
confidence: 99%
“…The data will be sent to a research center for analysis to decide whenever the structure needs any maintenance. Moreover, µTESLA was used to create functionalities in route discovery and maintenance procedures for WSN authentication in (Djellouli et al, 2020) and in ) STEADY-µTESLA protocol has been proposed to secure for data quality and credibility in WSNs in cluster-based. Da Conceicao et al ( 2017) used μTESLA protocol to secure and authenticate information communication exchange in vehicular networks.…”
Section: Analysis and Applications For Broadcast Authentication Protocolsmentioning
confidence: 99%