메뉴 건너뛰기




Volumn 2, Issue 5, 2002, Pages 533-547

Adaptive security for multilevel ad hoc networks

Author keywords

Ad hoc network; Adaptive security; Distributed certification authority (CA); Heterogeneous wireless network; Partial CA; Threshold secret sharing; Wireless security

Indexed keywords


EID: 0345755816     PISSN: 15308669     EISSN: None     Source Type: Journal    
DOI: 10.1002/wcm.75     Document Type: Article
Times cited : (115)

References (53)
  • 3
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Imielinski T, Korth H (eds) Kluwer Academic Publishers: Norwell, MA
    • Johnson DB, Maltz DA. Dynamic source routing in ad hoc wireless networks. In Mobile Computing. Imielinski T, Korth H (eds). vol. 353, Kluwer Academic Publishers: Norwell, MA, 1996; pp. 153-181.
    • (1996) Mobile Computing , vol.353 , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 4
    • 85031307530 scopus 로고
    • Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
    • Perkins CE, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In SIGCOMM, 1994; pp. 234-244.
    • (1994) SIGCOMM , pp. 234-244
    • Perkins, C.E.1    Bhagwat, P.2
  • 5
    • 0033892676 scopus 로고    scopus 로고
    • Performance comparison of two on-demand routing protocols for ad hoc networks
    • Das SR, Perkins CE, Royer EE. Performance comparison of two on-demand routing protocols for ad hoc networks. In INFOCOM, 2000; pp. 3-12.
    • (2000) INFOCOM , pp. 3-12
    • Das, S.R.1    Perkins, C.E.2    Royer, E.E.3
  • 7
    • 0013398775 scopus 로고    scopus 로고
    • Internets in the sky: The capacity of three dimensional wireless networks
    • Gupta P, Kumar PR. Internets in the sky: the capacity of three dimensional wireless networks. Communications in Information Systems 2001; 1(1): 39-49.
    • (2001) Communications in Information Systems , vol.1 , Issue.1 , pp. 39-49
    • Gupta, P.1    Kumar, P.R.2
  • 9
    • 0034590134 scopus 로고    scopus 로고
    • UAV-aided intelligent routing for ad-hoc wireless network in single-area theater
    • Gu DL, Pei G, Ly H, Gerla M, Zhang B, Hong X. UAV-aided intelligent routing for ad-hoc wireless network in single-area theater. In IEEE WCNC, 2000; pp. 1220-1225.
    • (2000) IEEE WCNC , pp. 1220-1225
    • Gu, D.L.1    Pei, G.2    Ly, H.3    Gerla, M.4    Zhang, B.5    Hong, X.6
  • 10
    • 0013390634 scopus 로고    scopus 로고
    • Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs
    • Gu DL, Pei G, Ly H, Gerla M, Hong X. Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs. In IEEE MILCOM, 2000.
    • (2000) IEEE MILCOM
    • Gu, D.L.1    Pei, G.2    Ly, H.3    Gerla, M.4    Hong, X.5
  • 11
    • 0036402438 scopus 로고    scopus 로고
    • C-ICAMA, A centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs
    • Gu DL, Ly H, Hong X, Gerla M, Pei G, Lee Y. C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs. In IEEE WCNC, 2000; pp. 879-884.
    • (2000) IEEE WCNC , pp. 879-884
    • Gu, D.L.1    Ly, H.2    Hong, X.3    Gerla, M.4    Pei, G.5    Lee, Y.6
  • 15
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • Zhang Y, Lee W. Intrusion detection in wireless ad-hoc networks. In MOBICOM, 2000; pp. 275-283.
    • (2000) MOBICOM , pp. 275-283
    • Zhang, Y.1    Lee, W.2
  • 16
    • 0348096476 scopus 로고    scopus 로고
    • Netscape Communications Corporation. SSL 3.0 Specification
    • Netscape Communications Corporation. SSL 3.0 Specification.
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest RL, Shamir A, Adleman LM. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2): 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 21
    • 0000552770 scopus 로고    scopus 로고
    • Twenty years of attacks on the RSA cryptosystem
    • Boneh D. Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society 1999; 46(2): 203-213.
    • (1999) Notices of the American Mathematical Society , vol.46 , Issue.2 , pp. 203-213
    • Boneh, D.1
  • 23
    • 4944253148 scopus 로고    scopus 로고
    • Maintaining authenticated communication in the presence of break-ins
    • Canetti R, Halevi S, Herzberg A. Maintaining authenticated communication in the presence of break-ins. Journal of Cryptology 2000; 13(1): 61-105.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 61-105
    • Canetti, R.1    Halevi, S.2    Herzberg, A.3
  • 24
    • 0034448545 scopus 로고    scopus 로고
    • Funkspiel schemes: An alternative to conventional tamper resistance
    • Hastad J, Jonsson J, Juels A, Yung M. Funkspiel schemes: an alternative to conventional tamper resistance. In ACM CCS, 2000; pp. 125-133.
    • (2000) ACM CCS , pp. 125-133
    • Hastad, J.1    Jonsson, J.2    Juels, A.3    Yung, M.4
  • 25
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Communications of the ACM 1979; 22(11): 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 26
    • 0008095081 scopus 로고
    • Parallel Reliable Threshold Multi-signature
    • Department of EECS, University of Wisconsin-Milwaukee, Milwaukee, WI
    • Frankel Y, Desmedt Y. Parallel Reliable Threshold Multi-signature. Technical Report TR-92-04-02, Department of EECS, University of Wisconsin-Milwaukee, Milwaukee, WI, 1992.
    • (1992) Technical Report TR-92-04-02
    • Frankel, Y.1    Desmedt, Y.2
  • 28
    • 84957689308 scopus 로고    scopus 로고
    • A simplified approach to threshold and proactive RSA
    • Rabin T. A simplified approach to threshold and proactive RSA. In CRYPTO, 1998; pp. 89-104.
    • (1998) CRYPTO , pp. 89-104
    • Rabin, T.1
  • 29
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • Shoup V. Practical threshold signatures. In EUROCRYPT, 2000; pp. 207-220.
    • (2000) EUROCRYPT , pp. 207-220
    • Shoup, V.1
  • 32
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L, Haas ZJ. Securing ad hoc networks. IEEE Networks 1999; 13(6): 24-30.
    • (1999) IEEE Networks , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 33
    • 0003515999 scopus 로고    scopus 로고
    • COCA: A Secure Distributed On-line Certification Authority
    • Computer Science Department, Cornell University, Ithaca, New York
    • Zhou L, Schneider FB, van Renesse R. COCA: A Secure Distributed On-line Certification Authority. Technical Report 2000-1828, Computer Science Department, Cornell University, Ithaca, New York, 2000.
    • (2000) Technical Report 2000-1828
    • Zhou, L.1    Schneider, F.B.2    Van Renesse, R.3
  • 38
    • 84947917119 scopus 로고    scopus 로고
    • Publicly verifiable secret sharing
    • Stadler M. Publicly verifiable secret sharing. In EUROCRYPT, 1996; pp. 190-199.
    • (1996) EUROCRYPT , pp. 190-199
    • Stadler, M.1
  • 39
    • 84957080948 scopus 로고    scopus 로고
    • A simple publicly verifiable secret sharing scheme and its application to electronic voting
    • Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to electronic voting. In CRYPTO, 1999; pp. 148-164.
    • (1999) CRYPTO , pp. 148-164
    • Schoenmakers, B.1
  • 40
    • 0030415891 scopus 로고    scopus 로고
    • Security on the move: Indirect authentication using kerberos
    • Fox A, Gribble SD. Security on the move: indirect authentication using kerberos. In MOBICOM, 1996; pp. 155-164.
    • (1996) MOBICOM , pp. 155-164
    • Fox, A.1    Gribble, S.D.2
  • 41
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • Steiner G, Neuman BC, Schiller JI. Kerberos: an authentication service for open network systems. In USENIX Winter, 1988; pp. 191-202.
    • (1988) USENIX Winter , pp. 191-202
    • Steiner, G.1    Neuman, B.C.2    Schiller, J.I.3
  • 42
    • 84958639277 scopus 로고    scopus 로고
    • Efficient generation of shared RSA keys
    • Boneh D, Franklin MK. Efficient generation of shared RSA keys. In CRYPTO, 1997; pp. 425-439.
    • (1997) CRYPTO , pp. 425-439
    • Boneh, D.1    Franklin, M.K.2
  • 44
    • 85017404375 scopus 로고    scopus 로고
    • A group mobility model for ad hoc wireless networks
    • Hong X, Gerla M, Pei G, Chiang CC. A group mobility model for ad hoc wireless networks. In ACM/IEEE MSWiM, 1999; pp. 53-60.
    • (1999) ACM/IEEE MSWiM , pp. 53-60
    • Hong, X.1    Gerla, M.2    Pei, G.3    Chiang, C.C.4
  • 45
    • 84954111940 scopus 로고    scopus 로고
    • LANMAR: Landmark routing for large scale wireless ad hoc networks with group mobility
    • Pei G, Hong X, Gerla M. LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility. In IEEE/ACM MobiHOC, 2000.
    • (2000) IEEE/ACM MobiHOC
    • Pei, G.1    Hong, X.2    Gerla, M.3
  • 46
    • 84907551158 scopus 로고    scopus 로고
    • A wireless hierarchical routing protocol with group mobility
    • Pei G, Gerla M, Hong X, Chiang CC. A wireless hierarchical routing protocol with group mobility. In IEEE WCNC, 1999.
    • (1999) IEEE WCNC
    • Pei, G.1    Gerla, M.2    Hong, X.3    Chiang, C.C.4
  • 48
    • 0348096477 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation
    • Standard Performance Evaluation Corporation. http://www. specbench.org.
  • 49
    • 0348096480 scopus 로고    scopus 로고
    • RSA Security Inc. PKCS #1 - RSA Cryptography Standard
    • RSA Security Inc. PKCS #1 - RSA Cryptography Standard. http://www.rsasecurity.com/rsalabs/pkcs/pkcs-1/.
  • 50
    • 0346205281 scopus 로고    scopus 로고
    • Landmark routing in large wireless battlefield networks using UAVs
    • Xu K, Hong X, Ly H, Gerla M, Gu DL. Landmark routing in large wireless battlefield networks using UAVs. In IEEE MILCOM 2001.
    • (2001) IEEE MILCOM
    • Xu, K.1    Hong, X.2    Ly, H.3    Gerla, M.4    Gu, D.L.5
  • 51
    • 0347466578 scopus 로고    scopus 로고
    • PGPi Project
    • PGPi Project. http://www.pgpi.org/.
  • 53
    • 0002474948 scopus 로고    scopus 로고
    • Performance comparison of public-key cryptosystems
    • Wiener MJ. Performance comparison of public-key cryptosystems. RSA CryptoBytes 1998; 4(1): 1-5.
    • (1998) RSA CryptoBytes , vol.4 , Issue.1 , pp. 1-5
    • Wiener, M.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.