Research Article
From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT
Intruder() = | //sends to CU messages by pretending to be a legitimate sensor node | ca!ID.(No.RandLoc()).CU_1 -> Intruder() | ca!ID.(No.RandLoc()).CU_2 -> Intruder() | //intercept messages from the channel | ca?ID_.Loc_.ID_ -> Intruder() | cb?ID_.Loc_.ID_ -> Intruder() | |
|