Learn More
This errata is published to clarify the differences between the paper and our previously published related work. 1 Clarification In [2], we proposed a modification of AODV that explains functionality in the form of flow-charts; the PEAK value is calculated by RREP sequence number, routing table sequence number and number of replies that gives lower(More)
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration, as a result, they are vulnerable to different types of attacks in different layers of protocol stack. Each node in a MANET is capable of acting as a router. Routing is one of the aspects having various security concerns.(More)
In Ciphertext-Policy Attribute Based Encryption (CP-ABE), attributes are attached to the user's secret key and access policy is attached to the ciphertext. If attributes in the secret key of a user satisfy the policy then only the user can decrypt the ciphertext. However, such scenario also necessitates periodic updating of the secret key with the(More)
—The proliferation of Mobile Adhoc Networks (MANETs) help to realize the nomadic computing paradigm with ubiquitous access. Though they ensure self-maintainable, dynamic and temporary topology, the MANETS also suffer from constraints in power, storage and computational resources. In addition, the pervasiveness, ubiquity and the inherent wireless nature,(More)
Requirements Engineering is one of the most vital activities in the entire Software Development Life Cycle. The success of the software is largely dependent on how well the users' requirements have been understood and converted into appropriate functionalities in the software. Typically, the users convey their requirements in natural language statements(More)
Ensuring communications security in Wireless Sensor Networks (WSNs) indeed is critical; due to the criticality of the resources in the sensor nodes as well as due to their ubiquitous and pervasive deployment, with varying attributes and degrees of security required. The proliferation of the next generation sensor nodes, has not solved this problem, because(More)
Due to wireless communication, dynamic topology, limited resources and lack of centralized administration, MANETs are vulnerable to various types of DoS attacks on network layer. In Gray hole and Black hole attacks malicious nodes deliberately disrupt data transmission in the network by sending incorrect routing information. It is a challenge to keep the(More)
The area of formal verification of protocols has gained substantial importance in the recent years. The research results and subsequent applications have amply demonstrated that the formal verification tools have indeed helped correct the protocols even after being standardized. However, the standard protocol verification tools and techniques do not verify(More)