메뉴 건너뛰기




Volumn , Issue , 2002, Pages 12-23

Ariadne: A secure on-demand routing protocol for ad hoc networks

Author keywords

Ad hoc network routing; Routing; Security

Indexed keywords

CRYPTOGRAPHY; NETWORK PROTOCOLS; PACKET NETWORKS; ROUTERS; SECURITY OF DATA;

EID: 0036957315     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1023)

References (58)
  • 1
    • 0002431508 scopus 로고
    • The ALOHA system-another alternative for computer communications
    • November
    • Norman Abramson. The ALOHA System-Another Alternative for Computer Communications. In Proceedings of the Fall 1970 AFIPS Computer Conference, pages 281-285, November 1970.
    • (1970) Proceedings of the Fall 1970 AFIPS Computer Conference , pp. 281-285
    • Abramson, N.1
  • 3
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • In Advances in Cryptology - Crypto '96 edited by Neal Koblitz; Springer-Verlag
    • Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying Hash Functions for Message Authentication. In Advances in Cryptology - Crypto '96, edited by Neal Koblitz, pages 1-15. Springer-Verlag, 1996. Lecture Notes in Computer Science Volume 1109.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 9
  • 10
    • 85008056769 scopus 로고    scopus 로고
    • Protecting routing infrastructures from denial of service using cooperative intrusion detection
    • September
    • Steven Cheung and Karl Levitt. Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection. In The 1997 New Security Paradigms Workshop, pages 94-106, September 1998.
    • (1998) The 1997 New Security Paradigms Workshop , pp. 94-106
    • Cheung, S.1    Levitt, K.2
  • 11
    • 0012609256 scopus 로고    scopus 로고
    • Tom Clark's totally accurate clock FTP site
    • Greenbelt, Maryland
    • Tom Clark. Tom Clark's Totally Accurate Clock FTP Site. Greenbelt, Maryland. Available at ftp://aleph.gsfc.nasa.gov/GPS/totally.accurate.clock/.
    • Clark, T.1
  • 13
    • 0004118143 scopus 로고    scopus 로고
    • A secure routing protocol for ad hoc networks
    • Technical Report UM-CS-2001-037, Electrical Engineering and Computer Science, University of Michigan, August
    • Bridget Dahill, Brian Neil Levine, Elizabeth Royer, and Clay Shields. A Secure Routing Protocol for Ad Hoc Networks. Technical Report UM-CS-2001-037, Electrical Engineering and Computer Science, University of Michigan, August 2001.
    • (2001)
    • Dahill, B.1    Levine, B.N.2    Royer, E.3    Shields, C.4
  • 14
    • 0004035649 scopus 로고    scopus 로고
    • The TLS protocol version 1.0
    • RFC 2246, January
    • T. Dierks and C. Allen. The TLS protocol version 1.0. RFC 2246, January 1999.
    • (1999)
    • Dierks, T.1    Allen, C.2
  • 17
    • 0003523471 scopus 로고    scopus 로고
    • Protection of BGP sessions via the TCP MD5 signature option
    • RFC 2385, August
    • Andy Hefferman. Protection of BGP Sessions via the TCP MD5 Signature Option. RFC 2385, August 1998.
    • (1998)
    • Hefferman, A.1
  • 21
    • 0012575586 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Technical report, Department of Computer Science, Rice University, December
    • Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. Technical report, Department of Computer Science, Rice University, December 2001.
    • (2001)
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 22
    • 3042667172 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • Technical Report TR01-384, Department of Computer Science, Rice University, June
    • Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. Technical Report TR01-384, Department of Computer Science, Rice University, June 2002.
    • (2002)
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3
  • 27
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • edited by Tomasz Imielinski and Hank Korth, chapter 5; Kluwer Academic Publishers
    • David B. Johnson and David A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing. edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153-181. Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 28
    • 0003597247 scopus 로고    scopus 로고
    • The dynamic source routing protocol for mobile ad hoc networks
    • Internet-Draft, draft-ietf-manet-dsr-07.txt, February; Work in progress
    • David B. Johnson, David A. Maltz, Yih-Chun Hu, and Jorjeta G. Jetcheva. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. Internet-Draft, draft-ietf-manet-dsr-07.txt, February 2002. Work in progress.
    • (2002)
    • Johnson, D.B.1    Maltz, D.A.2    Hu, Y.-C.3    Jetcheva, J.G.4
  • 29
    • 0023139974 scopus 로고
    • The DARPA packet radio network protocols
    • January
    • John Jubin and Janet D. Tornow. The DARPA Packet Radio Network Protocols. Proceedings of the IEEE, 75(1):21-32, January 1987.
    • (1987) Proceedings of the IEEE , vol.75 , Issue.1 , pp. 21-32
    • Jubin, J.1    Tornow, J.D.2
  • 33
    • 0003899818 scopus 로고
    • The kerberos network authentication service (V5)
    • RFC 1510, September
    • John Kohl and B Clifford Neuman. The Kerberos Network Authentication Service (V5). RFC 1510, September 1993.
    • (1993)
    • Kohl, J.1    Clifford Neuman, B.2
  • 34
    • 0012580890 scopus 로고
    • Integration of security in network routing protocols
    • B. Kumar. Integration of Security in Network Routing Protocols. SIGSAC Review, 11(2):18-25, 1993.
    • (1993) SIGSAC Review , vol.11 , Issue.2 , pp. 18-25
    • Kumar, B.1
  • 35
    • 0032667063 scopus 로고    scopus 로고
    • The effects of on-demand behavior in routing protocols for multi-hop wireless ad hoc networks
    • August
    • David A. Maltz, Josh Broch, Jorjeta Jetcheva, and David B. Johnson. The Effects of On-Demand Behavior in Routing Protocols for Multi-Hop Wireless Ad Hoc Networks. IEEE Journal on Selected Areas in Communications, 17(8):1439-1453, August 1999.
    • (1999) IEEE Journal on Selected Areas in Communications , vol.17 , Issue.8 , pp. 1439-1453
    • Maltz, D.A.1    Broch, J.2    Jetcheva, J.3    Johnson, D.B.4
  • 37
    • 0003424562 scopus 로고    scopus 로고
    • TCP selective acknowledgement options
    • RFC 2018, October
    • Matt Mathis, Jamshid Mahdavi, Sally Floyd, and Allyn Romanow. TCP Selective Acknowledgement Options. RFC 2018, October 1996.
    • (1996)
    • Mathis, M.1    Mahdavi, J.2    Floyd, S.3    Romanow, A.4
  • 39
    • 0003672666 scopus 로고    scopus 로고
    • Neighbor discovery for IP version 6 (IPv6)
    • RFC 2461, December
    • Thomas Narten, Erik Nordmark, and William Allen Simpson. Neighbor Discovery for IP Version 6 (IPv6). RFC 2461, December 1998.
    • (1998)
    • Narten, T.1    Nordmark, E.2    Simpson, W.A.3
  • 44
    • 0033690336 scopus 로고    scopus 로고
    • Efficient authentication and signing of multicast streams over lossy channels
    • May
    • Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song. Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In IEEE Symposium on Security and Privacy, pages 56-73, May 2000.
    • (2000) IEEE Symposium on Security and Privacy , pp. 56-73
    • Perrig, A.1    Canetti, R.2    Tygar, J.D.3    Song, D.4
  • 48
    • 0004092895 scopus 로고
    • A border gateway protocol 4 (BGP-4)
    • RFC 1771, March
    • Yakov Rekhter and Tony Li. A Border Gateway Protocol 4 (BGP-4). RFC 1771, March 1995.
    • (1995)
    • Rekhter, Y.1    Li, T.2
  • 49
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 50
    • 0030373106 scopus 로고    scopus 로고
    • Securing the border gateway routing protocol
    • November
    • Bradley R. Smith and J.J. Garcia-Luna-Aceves. Securing the Border Gateway Routing Protocol. In Global Internet'96, pages 81-85, November 1996.
    • (1996) Global Internet'96 , pp. 81-85
    • Smith, B.R.1    Garcia-Luna-Aceves, J.J.2
  • 53
    • 85177170726 scopus 로고    scopus 로고
    • Trimble Navigation Limited. Data Sheet and Specifications for Trimble Thunderbolt GPS Disciplined Clock. Sunnyvale, California
    • Trimble Navigation Limited. Data Sheet and Specifications for Trimble Thunderbolt GPS Disciplined Clock. Sunnyvale, California. Available at http://www.trimble.com/thunderbolt.html.
  • 54
    • 0035731128 scopus 로고    scopus 로고
    • Multipath routing in mobile ad hoc networks or how to route in the presence of topological changes
    • October
    • Aristotelis Tsirigos and Zygmunt J. Haas. Multipath Routing in Mobile Ad Hoc Networks or How to Route in the Presence of Topological Changes. In Proceedings of IEEE MILCOM 2001, pages 878-883, October 2001.
    • (2001) Proceedings of IEEE MILCOM 2001 , pp. 878-883
    • Tsirigos, A.1    Haas, Z.J.2
  • 55
    • 0003826083 scopus 로고    scopus 로고
    • Security-aware ad hoc routing for wireless networks
    • Technical Report UIUCDCS-R-2001-2241, Department of Computer Science, University of Illinois at Urbana-Champaign, August
    • Seung Yi, Prasad Naldurg, and Robin Kravets. Security-Aware Ad hoc Routing for Wireless Networks. Technical Report UIUCDCS-R-2001-2241, Department of Computer Science, University of Illinois at Urbana-Champaign, August 2001.
    • (2001)
    • Yi, S.1    Naldurg, P.2    Kravets, R.3
  • 56
    • 0003456435 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector (SAODV) routing
    • IETF MANET Mailing List, Message-ID:3BC17B40.BBF52E09@nokia.com; October 8
    • Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing. IETF MANET Mailing List, Message-ID:3BC17B40.BBF52E09@nokia.com, Available at ftp://manet.itd.nrl.navy.mil/pub/manet/2001-10.mail, October 8, 2001.
    • (2001)
    • Zapata, M.G.1
  • 58
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • November/December
    • Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, 13(6):24-30, November/December 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.