Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
39 views6 pages

Security in Wireless Sensor Networks

The document reports on the NSF workshop on formal methods for security held November 19-20, 2015. It discusses three topics: 1) Formal verification of an actor relocation algorithm for safety-critical applications using complementary formal and informal techniques, 2) A paper presenting a movement control actor relocation algorithm for wireless sensor networks that aims to improve coverage while minimizing movement overhead, modeled as a dynamic graph and specified using Z notation, 3) Formal specifications of denial of service attacks in wireless sensor networks published in March 2016.

Uploaded by

zainab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views6 pages

Security in Wireless Sensor Networks

The document reports on the NSF workshop on formal methods for security held November 19-20, 2015. It discusses three topics: 1) Formal verification of an actor relocation algorithm for safety-critical applications using complementary formal and informal techniques, 2) A paper presenting a movement control actor relocation algorithm for wireless sensor networks that aims to improve coverage while minimizing movement overhead, modeled as a dynamic graph and specified using Z notation, 3) Formal specifications of denial of service attacks in wireless sensor networks published in March 2016.

Uploaded by

zainab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Report on the NSF Workshop on Formal Methods for

1 Security Publish: 2016

Formal verification and validation of a


movement control actor relocation algorithm
for safetycritical applications
2 Jan-16

Formal specifications of Denial of Service attacks in


3 Wireless Sensor Networks 2016 mrch
The NSF workshop on Security and Formal Methods, held 19--20 Nove

Wireless Network This paper presents a localized movement control actor relocation

Wireless Sensor Networks (WSN) Z notation


rmal Methods, held 19--20 November 2015

ement control actor relocation (MCAR) algorithm that strives to improve connected coverage while minimizing move
ge while minimizing movement overhead.We employ complementary formal and informal techniques for MCAR verif
echniques for MCAR verification and validation. We model WSAN as a dynamic graph and transform MCAR to corre
transform MCAR to corresponding formal specification using Z notation.

You might also like