Many routing protocols have features that make them vulnerable to
security threats. This seems to be especially true in the case of many
routing protocols that have been proposed for wireless sensor
networks. In such circumstances how would one decide which is the
"most secure" routing protocol for a particular wireless sensor
network?
Would it be valuable to have an automatic tool for verifying the
security properties of routing protocols?
Is it feasible to use formal specifications and verification
techniques to build a tool to evaluate the security properties of
routing protocols?