메뉴 건너뛰기




Volumn , Issue , 2002, Pages 21-30

An on-demand secure routing protocol resilient to byzantine failures

Author keywords

Ad hoc wireless networks; Byzantine failures; On demand routing; Security

Indexed keywords

ALGORITHMS; NETWORK PROTOCOLS; ROUTERS; SECURITY OF DATA;

EID: 0036986441     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/570681.570684     Document Type: Conference Paper
Times cited : (319)

References (36)
  • 2
    • 0003582910 scopus 로고    scopus 로고
    • ch. Ad hoc On-Demand Distance Vector Routing. Addison-Wesley
    • C. E. Perkins and E. M. Royer, Ad hoc Networking, ch. Ad hoc On-Demand Distance Vector Routing. Addison-Wesley, 2000.
    • (2000) Ad Hoc Networking
    • Perkins, C.E.1    Royer, E.M.2
  • 3
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks
    • ch. 5, Addison-Wesley
    • D. B. Johnson, D. A. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. in Ad Hoc Networking, ch. 5, pp. 139-172. Addison-Wesley, 2001.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2    Broch, J.3
  • 7
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • November/December
    • L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network Magazine, vol. 13, November/December 1999.
    • (1999) IEEE Network Magazine , vol.13
    • Zhou, L.1    Haas, Z.2
  • 12
    • 0013091373 scopus 로고    scopus 로고
    • No. FIPS 198
    • The Keyed-Hash Message Authentication Code (HMAC). No. FIPS 198, National Institute for Standards and Technology (NIST), 2002. http://csrc.nist.gov/publications/fips/index.html.
    • (2002) The Keyed-Hash Message Authentication Code (HMAC)
  • 19
    • 0031383687 scopus 로고    scopus 로고
    • An efficient message authentication scheme for link state routing
    • December
    • S. Cheung, "An efficient message authentication scheme for link state routing," in The 13th Annual Computer Security Applications Conference, pp. 90-98, December 1997.
    • (1997) The 13th Annual Computer Security Applications Conference , pp. 90-98
    • Cheung, S.1
  • 21
    • 0013144099 scopus 로고    scopus 로고
    • Efficient and secure network routing algorithms
    • January
    • M. T. Goodrich, "Efficient and secure network routing algorithms." Provisional patent filing., January 2001.
    • (2001) Provisional Patent Filing
    • Goodrich, M.T.1
  • 24
    • 0032026162 scopus 로고    scopus 로고
    • Efficient security mechanisms for the border gateway routing protocol
    • B. Smith and J. Garcia-Luna-Aceves, "Efficient security mechanisms for the border gateway routing protocol," Computer Communications (Elsevier), vol. 21, no. 3, pp. 203-210, 1998.
    • (1998) Computer Communications (Elsevier) , vol.21 , Issue.3 , pp. 203-210
    • Smith, B.1    Garcia-Luna-Aceves, J.2
  • 29
    • 0013294745 scopus 로고    scopus 로고
    • Protecting routing infrastructures from denial of service using cooperative intrusion detection
    • S. Cheung and K. Levitt, "Protecting routing infrastructures from denial of service using cooperative intrusion detection," in New Security Paradigms Workshop, 1997.
    • (1997) New Security Paradigms Workshop
    • Cheung, S.1    Levitt, K.2
  • 32
    • 85032668813 scopus 로고
    • MACAW: A media access protocol for wireless LAN's
    • V. Bharghavan, A. J. Demers, S. Shenker, and L. Zhang, "MACAW: A media access protocol for wireless LAN's," in SIGCOMM, pp. 212-225, 1994.
    • (1994) SIGCOMM , pp. 212-225
    • Bharghavan, V.1    Demers, A.J.2    Shenker, S.3    Zhang, L.4
  • 33
    • 0013145154 scopus 로고    scopus 로고
    • When the CRC and TCP checksum disagree
    • August/September
    • J. Stone and C. Partridge, "When the CRC and TCP checksum disagree," in ACM SIGCOM, August/September 2000.
    • (2000) ACM SIGCOM
    • Stone, J.1    Partridge, C.2
  • 34
    • 0017018484 scopus 로고
    • New directions in cryptography
    • November
    • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. IT-22, pp. 644-654, November 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 35
    • 0003629991 scopus 로고
    • No. FIPS 180-1
    • Secure Hash Standard (SHA1). No. FIPS 180-1, National Institute for Standards and Technology (NIST), 1995. http://www.itl.nist.gov/fipspubs/fip180-1.htm.
    • (1995) Secure Hash Standard (SHA1)
  • 36
    • 0003508558 scopus 로고    scopus 로고
    • No. FIPS 197
    • Advanced Encryption Standard (AES). No. FIPS 197, National Institute for Standards and Technology (NIST), 2001. http://csrc.nist.gov/encryption/aes/.
    • (2001) Advanced Encryption Standard (AES)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.