메뉴 건너뛰기




Volumn 13, Issue 6, 1999, Pages 24-30

Securing ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; CRYPTOGRAPHY; DATA PRIVACY; SECURITY OF DATA; TELECOMMUNICATION NETWORKS; TELECOMMUNICATION SERVICES; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 0033357103     PISSN: 08908044     EISSN: None     Source Type: Journal    
DOI: 10.1109/65.806983     Document Type: Article
Times cited : (1868)

References (49)
  • 2
    • 84964410786 scopus 로고
    • A network architecture providing host migration transparency
    • Sept.
    • F. Teraoka, Y. Yokore, and M. Tokoro, "A Network Architecture Providing Host Migration Transparency," SIGCOMM '91, vol. 21, no. 4, Sept. 1991, pp. 209-20.
    • (1991) SIGCOMM '91 , vol.21 , Issue.4 , pp. 209-220
    • Teraoka, F.1    Yokore, Y.2    Tokoro, M.3
  • 4
    • 0003626823 scopus 로고
    • Computer Science Press, Rockville, MD
    • M. K. Simon et al., Spread Spectrum Communications, vol. I-II, Computer Science Press, Rockville, MD, 1985.
    • (1985) Spread Spectrum Communications , vol.1-2
    • Simon, M.K.1
  • 5
    • 0023092944 scopus 로고
    • A design concept for reliable mobile radio networks with frequency hopping signaling
    • Jan.
    • A. Ephremides, J. E. Wieselthier, and D. J. Baker, "A Design Concept for Reliable Mobile Radio Networks with Frequency Hopping Signaling," Proc. IEEE, vol. 75, no. 1, Jan. 1987, pp. 56-73.
    • (1987) Proc. IEEE , vol.75 , Issue.1 , pp. 56-73
    • Ephremides, A.1    Wieselthier, J.E.2    Baker, D.J.3
  • 6
    • 0023123265 scopus 로고
    • Future directions in packet radio architecture and protocols
    • Jan.
    • N. Shacham and J. Westcott, "Future Directions in Packet Radio Architecture and Protocols," Proc. IEEE, vol. 75, no. 1, Jan. 1987, pp. 83-99.
    • (1987) Proc. IEEE , vol.75 , Issue.1 , pp. 83-99
    • Shacham, N.1    Westcott, J.2
  • 7
    • 0027629410 scopus 로고
    • Frequency-hopped spread spectrum in the presence of a flower partial-band jammer
    • July
    • A. A. Hassan, W. E. Stark, and J. E. Hershey, "Frequency-Hopped Spread Spectrum in the Presence of a Flower Partial-Band Jammer," IEEE Trans. Commun., vol. 41, no. 7, July 1993, pp. 1125-31.
    • (1993) IEEE Trans. Commun. , vol.41 , Issue.7 , pp. 1125-1131
    • Hassan, A.A.1    Stark, W.E.2    Hershey, J.E.3
  • 8
    • 0027635417 scopus 로고
    • Routing in frequency-hop packet radio networks with partial-band jamming
    • July
    • M. B. Pursley and H. B. Russel, "Routing in Frequency-Hop Packet Radio Networks with Partial-Band Jamming," IEEE Trans. Commun., vol. 41, no. 7, July 1993, pp. 1117-24.
    • (1993) IEEE Trans. Commun. , vol.41 , Issue.7 , pp. 1117-1124
    • Pursley, M.B.1    Russel, H.B.2
  • 9
    • 0030264587 scopus 로고    scopus 로고
    • An efficient routing algorithm for mobile wireless networks
    • Oct.
    • S. Murphy and J. J. Garcia-Luna-Aceves, "An Efficient Routing Algorithm for Mobile Wireless Networks," MONET, Oct. 1996, vol. 1, no. 2, pp. 183-97.
    • (1996) MONET , vol.1 , Issue.2 , pp. 183-197
    • Murphy, S.1    Garcia-Luna-Aceves, J.J.2
  • 10
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad-hoc wireless networks
    • D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad-Hoc Wireless Networks," Mobile Comp., 1996.
    • (1996) Mobile Comp.
    • Johnson, D.B.1    Maltz, D.A.2
  • 11
    • 0029723943 scopus 로고    scopus 로고
    • A mobile radio network architecture with dynamically changing topology using virtual subnets
    • Dallas, TX, June
    • J. Sharony, "A Mobile Radio Network Architecture with Dynamically Changing Topology using Virtual Subnets," Proc. ICC/SUPERCOMM '96, Dallas, TX, June 1996, pp. 807-12.
    • (1996) Proc. ICC/SUPERCOMM '96 , pp. 807-812
    • Sharony, J.1
  • 12
    • 0031353437 scopus 로고    scopus 로고
    • A highly adaptable distributed routing algorithm for mobile wireless networks
    • Kobe, Japan
    • V. D. Park and M. S. Corson, "A Highly Adaptable Distributed Routing Algorithm for Mobile Wireless Networks," IEEE INFOCOM '97, Kobe, Japan, 1997.
    • (1997) IEEE INFOCOM '97
    • Park, V.D.1    Corson, M.S.2
  • 14
    • 0003119120 scopus 로고    scopus 로고
    • The performance of query control schemes for zone routing protocol
    • June
    • Z. J. Haas and M. Perlman, "The Performance of Query Control Schemes for Zone Routing Protocol," SIGCOMM '98, June 1998.
    • (1998) SIGCOMM '98
    • Haas, Z.J.1    Perlman, M.2
  • 16
    • 34347349933 scopus 로고    scopus 로고
    • Ad hoc on-demand distance vector routing
    • New Orleans, LA, Feb.
    • C. E. Perkins and E. M Royer, "Ad Hoc On-Demand Distance Vector Routing," IEEE WMCSA '99, New Orleans, LA, Feb. 1999.
    • (1999) IEEE WMCSA '99
    • Perkins, C.E.1    Royer, E.M.2
  • 17
    • 0027693935 scopus 로고
    • Diversity coding for transparent self-healing and fault-tolerant communication networks
    • Nov.
    • E. Ayanoglu et al., "Diversity Coding for Transparent Self-Healing and Fault-Tolerant Communication Networks," IEEE Trans. Commun., vol. 41, no. 11, Nov. 1993, pp. 1677-86.
    • (1993) IEEE Trans. Commun. , vol.41 , Issue.11 , pp. 1677-1686
    • Ayanoglu, E.1
  • 18
    • 0003339136 scopus 로고
    • The digital distributed systems security architecture
    • NIST
    • M. Gasser et al., "The Digital Distributed Systems Security Architecture," Proc. 12th Nat'l. Comp. Security Conf., NIST, 1989, pp. 305-19.
    • (1989) Proc. 12th Nat'l. Comp. Security Conf. , pp. 305-319
    • Gasser, M.1
  • 19
    • 0026154828 scopus 로고
    • SPX: Global authentication using public key certificates
    • Oakland, CA, May
    • J. J. Tardo and K. Algappan, "SPX: Global Authentication Using Public Key Certificates," Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 1991, pp. 232-44.
    • (1991) Proc. IEEE Symp. Security and Privacy , pp. 232-244
    • Tardo, J.J.1    Algappan, K.2
  • 22
    • 0028462933 scopus 로고
    • Threshold cryptography
    • July-Aug.
    • Y. Desmedt, "Threshold Cryptography," Euro. Trans. Telecommun., vol. 5, no. 4, July-Aug. 1994, pp. 449-57.
    • (1994) Euro. Trans. Telecommun. , vol.5 , Issue.4 , pp. 449-457
    • Desmedt, Y.1
  • 26
    • 0010316932 scopus 로고
    • Proactive secret sharing and public key cryptosystems
    • Master's Thesis, MIT, Sept.
    • S. Jarecki, "Proactive Secret Sharing and Public Key Cryptosystems," Master's Thesis, Dept. Elec. Eng. and Comp. Sci., MIT, Sept. 1995.
    • (1995) Dept. Elec. Eng. and Comp. Sci.
    • Jarecki, S.1
  • 27
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • D. Coppersmith, Ed., Aug. Springer-Verlag
    • A. Herzberg et al., "Proactive Secret Sharing or: How to Cope with Perpetual Leakage," Advances in Cryptology - Crypto '95 (Lecture Notes in Computer Science 963), D. Coppersmith, Ed., Aug. 1995, Springer-Verlag, pp. 457-69.
    • (1995) Advances in Cryptology - Crypto '95 (Lecture Notes in Computer Science 963) , vol.963 , pp. 457-469
    • Herzberg, A.1
  • 31
    • 0023538330 scopus 로고
    • A practical scheme for noninteractive verifiable secret sharing
    • P. Feldman, "A Practical Scheme for Noninteractive Verifiable Secret Sharing," Proc. 28th IEEE Symp. Foundations of Comp. Sci., 1987, pp. 427-37.
    • (1987) Proc. 28th IEEE Symp. Foundations of Comp. Sci. , pp. 427-437
    • Feldman, P.1
  • 32
    • 84982943258 scopus 로고
    • Noninteractive and information-theoretic secure verifiable secret sharing
    • Springer-Verlag, Aug.
    • T. P. Pedersen, "Noninteractive and Information-Theoretic Secure Verifiable Secret Sharing," Crypto '91 (Lecture Notes in Computer Science 576), Springer-Verlag, Aug. 1992, pp. 129-40.
    • (1992) Crypto '91 (Lecture Notes in Computer Science 576) , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 33
    • 0038061165 scopus 로고    scopus 로고
    • Redistributing secret shares to new access structures and its applications
    • George Mason Univ., July
    • Y. Desmedt and S. Jajodia, "Redistributing Secret Shares to New Access Structures and Its Applications," Tech. rep. ISSE_TR-97-01, George Mason Univ., July 1997.
    • (1997) Tech. Rep. ISSE_TR-97-01
    • Desmedt, Y.1    Jajodia, S.2
  • 34
    • 0022045868 scopus 로고
    • Impossibility of distributed consensus with one faulty processor
    • Apr.
    • M. J. Fisher, N. A. Lynch, and M. S. Peterson, "Impossibility of Distributed Consensus with One Faulty Processor," J. ACM, vol. 32, no. 2, Apr. 1985, pp. 374-82.
    • (1985) J. ACM , vol.32 , Issue.2 , pp. 374-382
    • Fisher, M.J.1    Lynch, N.A.2    Peterson, M.S.3
  • 35
    • 0003828107 scopus 로고
    • Ph.D. thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology
    • R. Perlman, "Network Layer Protocols with Byzantine Robustness," Ph.D. thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1988.
    • (1988) Network Layer Protocols with Byzantine Robustness
    • Perlman, R.1
  • 36
    • 0012580890 scopus 로고
    • Integration of security in network routing protocols
    • B. Kumar, "Integration of security in network routing protocols," SIGSAC Reviews, vol. 11, no. 2, 1993, pp. 18-25.
    • (1993) SIGSAC Reviews , vol.11 , Issue.2 , pp. 18-25
    • Kumar, B.1
  • 37
    • 0030714201 scopus 로고    scopus 로고
    • Securing the nimrod routing architecture
    • Los Alamitos, CA, Feb. The Internet Society, IEEE Computer Society Press
    • K. E. Sirois and S. T. Kent, "Securing the Nimrod Routing Architecture," Proc. Symposium on Network and Distributed System Security, Los Alamitos, CA, Feb. 1997, The Internet Society, IEEE Computer Society Press, pp. 74-84.
    • (1997) Proc. Symposium on Network and Distributed System Security , pp. 74-84
    • Sirois, K.E.1    Kent, S.T.2
  • 39
    • 0033296081 scopus 로고    scopus 로고
    • Lowering security overhead in link state routing
    • R. Hauser, T. Przygienda, and G. Tsudik, "Lowering Security Overhead in Link State Routing," Comp. Networks, Apr. 1999, vol. 31, no. 8, pp. 885-94.
    • (1999) Comp. Networks, Apr. , vol.31 , Issue.8 , pp. 885-894
    • Hauser, R.1    Przygienda, T.2    Tsudik, G.3
  • 40
    • 0030126124 scopus 로고    scopus 로고
    • Distributing trust with the rampart toolkit
    • M. K. Reiter, "Distributing Trust with the Rampart toolkit," Commun. ACM, vol. 39, no. 4, 1996, pp. 71-74.
    • (1996) Commun. ACM , vol.39 , Issue.4 , pp. 71-74
    • Reiter, M.K.1
  • 42
    • 0030376048 scopus 로고    scopus 로고
    • The Ω key management service
    • M. K. Reiteret al., "The Ω Key Management Service," J. Comp. Security, vol. 4, no. 4, 1996, pp. 267-97.
    • (1996) J. Comp. Security , vol.4 , Issue.4 , pp. 267-297
    • Reiter, M.K.1
  • 43
    • 0027617271 scopus 로고
    • Increasing availability and security of an authentication service
    • June
    • L. Gong, "Increasing Availability and Security of an Authentication Service," IEEE JSAC, vol. 11, no. 5, June 1993, pp. 657-62.
    • (1993) IEEE JSAC , vol.11 , Issue.5 , pp. 657-662
    • Gong, L.1
  • 45
    • 0032306029 scopus 로고    scopus 로고
    • Byzantine quorum systems
    • D. Malkhi and M. Reiter, "Byzantine Quorum Systems," J. Dist. Comp., vol. 11, no. 4, 1998.
    • (1998) J. Dist. Comp. , vol.11 , Issue.4
    • Malkhi, D.1    Reiter, M.2
  • 47
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • Dec.
    • F. B. Schneider, "Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial," ACM Comp. Surveys, vol. 22, no. 4, Dec. 1990, pp. 299-319.
    • (1990) ACM Comp. Surveys , vol.22 , Issue.4 , pp. 299-319
    • Schneider, F.B.1
  • 48
    • 0032687836 scopus 로고    scopus 로고
    • Ad hoc mobility management using quorum systems
    • Z. J. Haas and B. Liang, "Ad Hoc Mobility Management using Quorum Systems," IEEE/ACM Trans. Net., 1999.
    • (1999) IEEE/ACM Trans. Net.
    • Haas, Z.J.1    Liang, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.