The goal of this chapter is to give the flavor of what has been done within the area of formal verification of secure wireless systems. Indeed, we assist to a successful proliferation of research ideas within this area. Here, we aim at illustrating popular methodologies and models, that have been applied to specific case studies, e.g., Bluetooth and IEEE 802.11 security for modeling and performing security analysis.

Formal techniques for security analysis in wireless systems

Martinelli F;Petrocchi M
2008

Abstract

The goal of this chapter is to give the flavor of what has been done within the area of formal verification of secure wireless systems. Indeed, we assist to a successful proliferation of research ideas within this area. Here, we aim at illustrating popular methodologies and models, that have been applied to specific case studies, e.g., Bluetooth and IEEE 802.11 security for modeling and performing security analysis.
2008
Istituto di informatica e telematica - IIT
Security and Privacy in Wireless and Mobile Networking
9781905886906
Troubador Publishing
Leicester
REGNO UNITO DI GRAN BRETAGNA
Security
wireless systems
Codice Puma: cnr.iit/2008-A1-001
2
02 Contributo in Volume::02.01 Contributo in volume (Capitolo o Saggio)
268
none
Martinelli, F; Petrocchi, M
info:eu-repo/semantics/bookPart
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/96889
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact