메뉴 건너뛰기




Volumn , Issue , 2004, Pages 89-96

Secure multipath routing for mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

MALICIOUS NODES; MULTI PATH ROUTING; MULTIPATH ROUTING PROTOCOLS; ON DEMANDS; ON-DEMAND ROUTING PROTOCOL; PROTOCOL CANS; SECURITY ATTACKS; SECURITY PROPERTIES;

EID: 25144473813     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WONS.2005.31     Document Type: Conference Paper
Times cited : (31)

References (26)
  • 3
    • 84956862121 scopus 로고    scopus 로고
    • Secure communication in an unknown network using certificates
    • LNCS. Springer
    • M. Burmester and Y. Desmedt. Secure communication in an unknown network using certificates. In Advances in Cryptology-Asiacrypt '99, LNCS Vol. 1716, pages 274-287. Springer, 1999.
    • (1999) Advances in Cryptology-Asiacrypt '99 , vol.1716 , pp. 274-287
    • Burmester, M.1    Desmedt, Y.2
  • 5
    • 84954161437 scopus 로고    scopus 로고
    • Enforcing service availability in mobile ad hoc WANs
    • BA, Massachusetts, Aug
    • L. Buttyan and J. Hubaux. Enforcing service availability in mobile ad hoc WANs. In Proceedings of the 1st MobiHoc Conference, BA, Massachusetts, Aug. 2000.
    • (2000) Proceedings of the 1st MobiHoc Conference
    • Buttyan, L.1    Hubaux, J.2
  • 8
    • 0003119120 scopus 로고    scopus 로고
    • The performance of query control schemes for zone routing protocol
    • Z. Haas and M. Perlman. The performance of query control schemes for zone routing protocol. In Proceedings of SIGCOMM'98, 1998.
    • (1998) Proceedings of SIGCOMM'98
    • Haas, Z.1    Perlman, M.2
  • 9
    • 1542317831 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc routing protocols
    • Y.-C. Hu, A. Perrig, and D. Johnson. Rushing attacks and defense in wireless ad hoc routing protocols. In Proceedings of WiSe 2003, pages 30-40, 2003.
    • (2003) Proceedings of WiSe 2003 , pp. 30-40
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.3
  • 11
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad-hoc wireless networks
    • Kluwer Academic Publishers
    • D. Johnson and D. Maltz. Dynamic source routing in ad-hoc wireless networks. In Mobile Computing, pages 152-181. Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , pp. 152-181
    • Johnson, D.1    Maltz, D.2
  • 12
    • 0000112683 scopus 로고    scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48:203-209, 1997.
    • (1997) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 13
    • 0034844688 scopus 로고    scopus 로고
    • Split multipath routing with maximally disjoint paths in ad hoc networks
    • Helsinki, Finland, June. IEEE
    • S.-J. Lee and M. Gerla. Split multipath routing with maximally disjoint paths in ad hoc networks. In Proceedings of ICC 2001, pages 3201-3205, Helsinki, Finland, June 2001. IEEE.
    • (2001) Proceedings of ICC 2001 , pp. 3201-3205
    • Lee, S.-J.1    Gerla, M.2
  • 17
    • 84944881532 scopus 로고    scopus 로고
    • On-demand multipath routing for mobile ad hoc networks
    • A. Nasipuri and S. Das. On-demand multipath routing for mobile ad hoc networks. In Proceedings of IEEE INFOCOM99, pages 64-70, 1999.
    • (1999) Proceedings of IEEE INFOCOM99 , pp. 64-70
    • Nasipuri, A.1    Das, S.2
  • 18
    • 84890048774 scopus 로고    scopus 로고
    • Secure message transmission in mobile ad hoc networks
    • P. Papadimitratos and Z. Haas. Secure message transmission in mobile ad hoc networks. Elsevier Ad Hoc Networks, pages 199-209.
    • Elsevier Ad Hoc Networks , pp. 199-209
    • Papadimitratos, P.1    Haas, Z.2
  • 21
    • 25144504623 scopus 로고    scopus 로고
    • Multipath power sensitive routing protocol for mobile ad hoc networks
    • Springer
    • A. P. Subramanian, A. J. Anto, J. Vasudevan, and P. Narayanasamy. Multipath power sensitive routing protocol for mobile ad hoc networks. LNCS Vol.2928, pages 171-183. Springer, 2003.
    • (2003) LNCS , vol.2928 , pp. 171-183
    • Subramanian, A.P.1    Anto, A.J.2    Vasudevan, J.3    Narayanasamy, P.4
  • 22
    • 0038365376 scopus 로고    scopus 로고
    • An extended dynamic source routing scheme in ad hoc wireless networks
    • J. Wu. An extended dynamic source routing scheme in ad hoc wireless networks. Telecommunication Systems, 22(1-4):61-75, 2003.
    • (2003) Telecommunication Systems , vol.22 , Issue.1-4 , pp. 61-75
    • Wu, J.1
  • 23
    • 0036980295 scopus 로고    scopus 로고
    • Self-organized network-layer security in mobile ad hoc networks
    • Atlanta, GA, USA, Sept. ACM
    • H. Yang, X. Meng, and S. Lu. Self-organized network-layer security in mobile ad hoc networks. In Proceedings of the ACM workshop on Wireless security, pages 11-20, Atlanta, GA, USA, Sept. 2002. ACM.
    • (2002) Proceedings of the ACM Workshop on Wireless Security , pp. 11-20
    • Yang, H.1    Meng, X.2    Lu, S.3
  • 26
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov
    • L. Zhou and Z. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, Nov. 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.