메뉴 건너뛰기




Volumn , Issue , 2003, Pages 41-50

Secure Data Transmission in Mobile Ad Hoc Networks

Author keywords

MANET security; Multi path Routing; Secure Message Transmission; Secure Routing; Secure Routing Protocol

Indexed keywords

DATA COMMUNICATION SYSTEMS; ESTIMATION; NETWORK PROTOCOLS; PACKET NETWORKS; PROBABILITY; ROBUSTNESS (CONTROL SYSTEMS); ROUTERS;

EID: 1542287664     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/941311.941318     Document Type: Conference Paper
Times cited : (133)

References (28)
  • 3
    • 0024641589 scopus 로고
    • Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance
    • Apr.
    • M.O. Rabin, "Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance," Journal of ACM, Vol. 36, No. 2, pp. 335-348, Apr. 1989.
    • (1989) Journal of ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 4
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-Hashing for Message Authentication
    • Feb.
    • H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication," RFC 2104, Feb. 1997.
    • (1997) RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 6
    • 0035507501 scopus 로고    scopus 로고
    • Multipath Routing in the Presence of Frequent Topological Changes
    • Nov.
    • A. Tsirigos and Z.J. Haas, "Multipath Routing in the Presence of Frequent Topological Changes," IEEE Comm. Magazine, pp. 132-138, Nov. 2001.
    • (2001) IEEE Comm. Magazine , pp. 132-138
    • Tsirigos, A.1    Haas, Z.J.2
  • 8
    • 0003068282 scopus 로고    scopus 로고
    • Security Architecture for the Internet Protocol
    • Nov.
    • S. Kent and R. Atkinson., "Security Architecture for the Internet Protocol," IETF RFC 2401, Nov. 1998.
    • (1998) IETF RFC , vol.2401
    • Kent, S.1    Atkinson, R.2
  • 9
    • 0003254362 scopus 로고    scopus 로고
    • IP Authentication Header
    • Nov.
    • S. Kent and R. Atkinson, "IP Authentication Header," IETF FC 2402, Nov. 1998.
    • (1998) IETF FC , vol.2402
    • Kent, S.1    Atkinson, R.2
  • 10
    • 0003315822 scopus 로고    scopus 로고
    • IP Encapsulating Security Payload
    • Nov.
    • S. Kent and R. Atkinson, "IP Encapsulating Security Payload" IETF FC 2406, Nov. 1998.
    • (1998) IETF FC , vol.2406
    • Kent, S.1    Atkinson, R.2
  • 11
    • 0003357112 scopus 로고    scopus 로고
    • Internet Security Association and Key Management Protocol
    • Nov.
    • D. Maughan, M. Schertler, M. Schneider, and J. Turner, "Internet Security Association and Key Management Protocol," IETF RFC 2408, Nov. 1998.
    • (1998) IETF RFC , vol.2408
    • Maughan, D.1    Schertler, M.2    Schneider, M.3    Turner, J.4
  • 12
    • 0003324496 scopus 로고    scopus 로고
    • Stream Control Transmission Protocol
    • Oct.
    • R. Stewart et al, "Stream Control Transmission Protocol," IETF RFC 2960, Oct. 2000.
    • (2000) IETF RFC , vol.2960
    • Stewart, R.1
  • 13
    • 0031352149 scopus 로고    scopus 로고
    • TCP-Boston: A Fragmentation-Tolerant TCP Protocol for ATM networks
    • Kobe, Japan, Apr.
    • A. Bestavros and G. Kim, "TCP-Boston: A Fragmentation-Tolerant TCP Protocol for ATM networks," in proceedings of the IEEE Infocom '97, Kobe, Japan, Apr. 1997.
    • (1997) Proceedings of the IEEE Infocom '97
    • Bestavros, A.1    Kim, G.2
  • 14
  • 15
    • 84954161437 scopus 로고    scopus 로고
    • Enforcing Service Availability in Mobile Ad Hoc WANs
    • BA Massachusetts, Aug.
    • L. Buttyan and J.P. Hubaux, "Enforcing Service Availability in Mobile Ad Hoc WANs," in proceedings of the 1st MobiHoc, BA Massachusetts, Aug. 2000.
    • (2000) Proceedings of the 1st MobiHoc
    • Buttyan, L.1    Hubaux, J.P.2
  • 17
    • 0001262977 scopus 로고
    • Probabilistic algorithms in finite fields
    • M. O. Rabin, "Probabilistic algorithms in finite fields," SIAM Jornal of Comput. 9, 1980.
    • (1980) SIAM Jornal of Comput. , vol.9
    • Rabin, M.O.1
  • 18
    • 0344095743 scopus 로고    scopus 로고
    • Using Elliptic Curve Diffie-Hellman in the SPKM GSS-API
    • Aug.
    • R. Zucceratto and C. Adams, "Using Elliptic Curve Diffie-Hellman in the SPKM GSS-API," IETF Internet Draft, Aug. 1999.
    • (1999) IETF Internet Draft
    • Zucceratto, R.1    Adams, C.2
  • 24
    • 0004118143 scopus 로고    scopus 로고
    • A Secure Routing Protocol for Ad Hoc Networks
    • EE&CS, Univ. of Michigan, Aug.
    • B. Dahill, B.N. Levine, E. Royer, C. Shields. "A Secure Routing Protocol for Ad Hoc Networks," Technical Report UM-CS-2001-037, EE&CS, Univ. of Michigan, Aug. 2001.
    • (2001) Technical Report , vol.UM-CS-2001-037
    • Dahill, B.1    Levine, B.N.2    Royer, E.3    Shields, C.4
  • 27
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc Networks
    • Nov/Dec.
    • L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no.6, Nov/Dec. 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.J.2
  • 28
    • 6344273537 scopus 로고    scopus 로고
    • Secure Message Transmission in Mobile Ad Hoc Networks
    • Jan/Feb/March
    • P. Papadimitratos and Z.J. Haas, "Secure Message Transmission in Mobile Ad Hoc Networks," Elsevier Ad Hoc Networks Journal, vol. 1, no. 1, Jan/Feb/March 2003.
    • (2003) Elsevier Ad Hoc Networks Journal , vol.1 , Issue.1
    • Papadimitratos, P.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.