Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

Formal security analysis of LoRaWAN

M Eldefrawy, I Butun, N Pereira, M Gidlund - Computer Networks, 2019 - Elsevier
Abstract Recent Low Power Wide Area Networks (LPWAN) protocols are receiving
increased attention from industry and academia to offer accessibility for Internet of Things …

[LIVRE][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

A lightweight continuous authentication protocol for the Internet of Things

YH Chuang, NW Lo, CY Yang, SW Tang - Sensors, 2018 - mdpi.com
Modern societies are moving toward an information-oriented environment. To gather and
utilize information around people's modern life, tiny devices with all kinds of sensing devices …

Vulnerability and impact analysis of the IEC 61850 GOOSE protocol in the smart grid

HT Reda, B Ray, P Peidaee, A Anwar, A Mahmood… - Sensors, 2021 - mdpi.com
IEC 61850 is one of the most prominent communication standards adopted by the smart grid
community due to its high scalability, multi-vendor interoperability, and support for several …

A lightweight privacy-preserving communication protocol for heterogeneous IoT environment

X Luo, L Yin, C Li, C Wang, F Fang, C Zhu… - IEEE Access, 2020 - ieeexplore.ieee.org
While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life,
the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing …

Provably repairing the ISO/IEC 9798 standard for entity authentication

D Basin, C Cremers, S Meier - Journal of Computer Security, 2013 - content.iospress.com
We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798
standard and find numerous weaknesses, both old and new, including some that violate …

Comparing state spaces in automatic security protocol analysis

CJF Cremers, P Lafourcade, P Nadeau - Formal to Practical Security …, 2009 - Springer
There are several automatic tools available for the symbolic analysis of security protocols.
The models underlying these tools differ in many aspects. Some of the differences have …

An authentication protocol for future sensor networks

M Bilal, SG Kang - Sensors, 2017 - mdpi.com
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs)
for ensuring secure data sessions. Sensor node authentication ensures the confidentiality …

Security analysis of automotive protocols

T Lauser, D Zelle, C Krauß - Proceedings of the 4th ACM Computer …, 2020 - dl.acm.org
The technology of modern vehicles is currently undergoing a major transformation with
increased communication and the introduction of new protocols. It is essential that these …