메뉴 건너뛰기




Volumn 60, Issue 7, 2004, Pages 4716-4720

Routing security and authentication mechanism for Mobile Ad Hoc Networks

Author keywords

Authentication; Hash function; Mobile ad hoc networks (MANET); Routing security; Secret sharing

Indexed keywords

ENERGY UTILIZATION; NETWORK PROTOCOLS; PROBLEM SOLVING; ROUTERS; SECURITY OF DATA; TELECOMMUNICATION NETWORKS; TOPOLOGY;

EID: 17144397587     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (14)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov./Dec.
    • L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network., vol. 13, pp. 24-30, Nov./Dec. 1999.
    • (1999) IEEE Network. , vol.13 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 3
    • 17144386087 scopus 로고    scopus 로고
    • Security considerations in ad hoc networks
    • to be appeared
    • F. Hu and N. K. Sharma, "Security Considerations in Ad Hoc Networks," to be appeared in Ad Hon Network, 2004.
    • (2004) Ad Hon Network
    • Hu, F.1    Sharma, N.K.2
  • 4
    • 12444324513 scopus 로고    scopus 로고
    • Providing secrecy in key management protocols for large wireless sensors networks
    • R.D. Pietro, L.V. Mancini, and S. Jajodia, "Providing Secrecy in Key Management Protocols for Large Wireless Sensors Networks," Ad Hoc Networks, Vol. 1, 2003, pp. 455-468.
    • (2003) Ad Hoc Networks , vol.1 , pp. 455-468
    • Pietro, R.D.1    Mancini, L.V.2    Jajodia, S.3
  • 6
    • 85031307530 scopus 로고
    • Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
    • C. E. Perkins, and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, " Proc. of SIGCOMM, pp. 234-244, 1994.
    • (1994) Proc. of SIGCOMM , pp. 234-244
    • Perkins, C.E.1    Bhagwat, P.2
  • 7
    • 1542356467 scopus 로고    scopus 로고
    • Ad Hoc On-Demand Distance Vector (AODV) routing
    • IETF Mobile Ad Hoc Networks Working Group, work in progress, 17 Feb.
    • C. E. Perkins, E. M. Royer, and S. R. Das, "Ad Hoc On-Demand Distance Vector (AODV) Routing," IETF Mobile Ad Hoc Networks Working Group, Internet Draft, work in progress, 17 Feb. 2003.
    • (2003) Internet Draft
    • Perkins, C.E.1    Royer, E.M.2    Das, S.R.3
  • 8
    • 1542356511 scopus 로고    scopus 로고
    • The dynamic source routing protocol for Mobile Ad Hoc Networks (DSR)
    • IETF Mobile Ad Hoc Networks Working Group, work in progress, 15 Apr.
    • D. B. Johnson, D. A. Maltz, and Y-C. Hu, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)," IETF Mobile Ad Hoc Networks Working Group, Internet Draft, work in progress, 15 Apr. 2003.
    • (2003) Internet Draft
    • Johnson, D.B.1    Maltz, D.A.2    Hu, Y.-C.3
  • 11
    • 0018545449 scopus 로고
    • How to share a secret
    • A Shamir, "How to Share a Secret," Comm. ACM, Vol. 22, No. 11, 1979, pp. 612-613.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 12
    • 0020721991 scopus 로고
    • A modular approach to key safeguarding
    • C. Asmuth and J. Bloom, "A Modular Approach to Key Safeguarding," IEEE Trans. Information Theory, vol. IT-29, no. 2, 1983, pp. 208-210.
    • (1983) IEEE Trans. Information Theory , vol.IT-29 , Issue.2 , pp. 208-210
    • Asmuth, C.1    Bloom, J.2
  • 14
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control schemes and their application
    • G. Simmons, Editor, IEEE Press
    • G.J. Simmons, An Introduction to Shared Secret and/or Shared Control Schemes and Their Application, in G. Simmons, Editor, Contemporary Cryptology: The Science of Information Integrity, IEEE Press, 1992.
    • (1992) Contemporary Cryptology: The Science of Information Integrity
    • Simmons, G.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.