메뉴 건너뛰기




Volumn 10, Issue 6 SPEC. ISS., 2005, Pages 985-995

Towards designing a trusted routing solution in mobile ad hoc networks

Author keywords

Collaborative trust based routing; Colluding malicious nodes; Mobile ad hoc networks; Secure communication

Indexed keywords

COLLABORATIVE TRUST-BASED ROUTING; COLLUDING MALICIOUS NODES; MOBILE AD HOC NETWORKS; SECURE COMMUNICATION;

EID: 29844453185     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11036-005-4454-4     Document Type: Article
Times cited : (60)

References (59)
  • 2
    • 21644434924 scopus 로고    scopus 로고
    • Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches
    • Ciudad Real, Spain
    • P. Albers et al., Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches, in: Wireless Information Systems, Ciudad Real, Spain (2002).
    • (2002) Wireless Information Systems
    • Albers, P.1
  • 3
    • 0032218239 scopus 로고    scopus 로고
    • Communication complexity of group key distribution
    • (San Francisco, California, United States), ISBN: 1-58113-007-4
    • Becker and Wille, Communication complexity of group key distribution, in: Proceedings of the 5th ACM Conference on Computer and Communications Security (San Francisco, California, United States, 1998) pp. 1-6, ISBN: 1-58113-007-4.
    • (1998) Proceedings of the 5th ACM Conference on Computer and Communications Security , pp. 1-6
    • Becker1    Wille2
  • 6
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol (Cooperation of nodes: Fairness in dynamic ad-hoc networks)
    • (Switzerland) June 9-11
    • S. Buchegger and J.-Y. Le Boudec, Performance analysis of the CONFIDANT protocol (Cooperation of nodes: Fairness in dynamic ad-hoc networks), in: MOBIHOC '02 (Switzerland) (June 9-11 2002).
    • (2002) MOBIHOC '02
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 9
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • A.D. Santis (ed.), vol. 950 of Lecture Notes in Computer Science, Springer-Verlag
    • M.V.D. Burmester and Y. Desmedt, A secure and efficient conference key distribution system, in: A.D. Santis (ed.), Advances in Cryptology-EUROCRYPT "94, vol. 950 of Lecture Notes in Computer Science, (Springer-Verlag, 1995) pp. 275-286.
    • (1995) Advances in Cryptology-EUROCRYPT "94 , pp. 275-286
    • Burmester, M.V.D.1    Desmedt, Y.2
  • 11
    • 4444314479 scopus 로고    scopus 로고
    • Mobility helps security in ad hoc networks
    • (Annapolis, Maryland, USA), June 1-3
    • S. Čapkun, J-P Hubaux, and L. Buttyán, Mobility helps security in ad hoc networks, in: MobiHoc '03, (Annapolis, Maryland, USA), June 1-3.
    • MobiHoc '03
    • Čapkun, S.1    Hubaux, J.-P.2    Buttyán, L.3
  • 14
    • 85032188633 scopus 로고
    • Society and group oriented cryptography: A new concept
    • Y. Desmedt, Society and group oriented cryptography: A new concept, in: Advances in Cryptology - Crypto'87 (1987) p. 120-127.
    • (1987) Advances in Cryptology - Crypto'87 , pp. 120-127
    • Desmedt, Y.1
  • 15
  • 22
    • 1642624766 scopus 로고    scopus 로고
    • Key establishment in ad hoc networks
    • Lab of Theoretical Computer Science, Helsinki University of Technology
    • M. Hietalahti, Key establishment in ad hoc networks, Technical Report, Lab of Theoretical Computer Science, Helsinki University of Technology (2001).
    • (2001) Technical Report
    • Hietalahti, M.1
  • 24
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad-hoc networks
    • (Atlanta, Georgia, USA) Sept. 23-26
    • Y-C Hu, A. Perrig and D.B. Johnson, Ariadne: A secure on-demand routing protocol for ad-hoc networks, in:MobiCom '02, (Atlanta, Georgia, USA) (Sept. 23-26 2002)
    • (2002) MobiCom '02
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 25
    • 0035789229 scopus 로고    scopus 로고
    • The quest for security in mobile ad hoc networks
    • J-P Hubaux, L. Buttyán and S. Čapkun, The quest for security in mobile ad hoc networks, in: MOBIHOC (2001).
    • (2001) MOBIHOC
    • Hubaux, J.-P.1    Buttyán, L.2    Čapkun, S.3
  • 27
    • 2642573748 scopus 로고    scopus 로고
    • Moving from security to distributed trust in ubiquitous computing environments
    • Dec.
    • L. Kagal, T. Finin and A. Joshi, Moving from security to distributed trust in ubiquitous computing environments, IEEE Computer, (Dec. 2001.)
    • (2001) IEEE Computer
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 30
    • 11244296240 scopus 로고    scopus 로고
    • A trust model based routing protocol for secure ad hoc networks
    • (Big Sky, Montana, USA). March 6-13
    • X. Li, M.R. Lyu and J. Liu, A trust model based routing protocol for secure ad hoc networks, in: Proceedings 2004 IEEE Aerospace Conference (Big Sky, Montana, USA). (March 6-13 2004).
    • (2004) Proceedings 2004 IEEE Aerospace Conference
    • Li, X.1    Lyu, M.R.2    Liu, J.3
  • 31
    • 4143071452 scopus 로고    scopus 로고
    • A survey of wireless security in mobile ad hoc networks: Challenges and available solutions
    • X. Cheng, X. Huang and D.Z. Du (Eds.), (Kluwer Academic Publishers)
    • W. Lou and Y. Fang, A survey of wireless security in mobile ad hoc networks: challenges and available solutions in: X. Cheng, X. Huang and D.Z. Du (Eds.), Ad Hoc Wireless Networking (Kluwer Academic Publishers, 2003) pp. 319-364.
    • (2003) Ad Hoc Wireless Networking , pp. 319-364
    • Lou, W.1    Fang, Y.2
  • 35
    • 84943745348 scopus 로고    scopus 로고
    • Secure link state routing for mobile ad hoc networks
    • in conjunction with the 2003 International Symposium on Applications and the Internet (Orlando, FL, Jan. 28)
    • P. Papadimitratos and Z.J. Haas, Secure link state routing for mobile ad hoc networks, in: Proc. IEEE Workshop on Security and Assurance in Adlioc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet (Orlando, FL, Jan. 28, 2003).
    • (2003) Proc. IEEE Workshop on Security and Assurance in Adlioc Networks
    • Papadimitratos, P.1    Haas, Z.J.2
  • 38
  • 40
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Commun. ACM 22 (1979) 612-613.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 43
    • 0029720059 scopus 로고    scopus 로고
    • Diffie-Hellman key distribution extended to group communication
    • New Delhi, India, 14-16 May
    • M. Steiner, G. Tsudik, and M. Waidner, Diffie-Hellman key distribution extended to group communication, in: Proc. 3rd ACM CCS (New Delhi, India, 14-16 May 1996) pp. 31-37.
    • (1996) Proc. 3rd ACM CCS , pp. 31-37
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 45
    • 11244333253 scopus 로고    scopus 로고
    • Trust evaluation in adhoc networks
    • Philadelphia, Pennsylvania, USA Oct. 1
    • G. Theodorakopoulos and J.S. Baras, Trust evaluation in adhoc networks, in: WiSe'04 (Philadelphia, Pennsylvania, USA Oct. 1 2004).
    • (2004) WiSe'04
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 48
    • 4544265289 scopus 로고    scopus 로고
    • Distributed security: Ad hoc networks & beyond
    • Rhul, Sept.
    • K. Wrons, Distributed security: ad hoc networks & beyond, in: Ad Hoc Networks Security Pampas Workshop (Rhul, Sept. 2002) pp. 16-17.
    • (2002) Ad Hoc Networks Security Pampas Workshop , pp. 16-17
    • Wrons, K.1
  • 50
    • 0036980295 scopus 로고    scopus 로고
    • Self-organized network layer security in mobile ad hoc networks
    • (Atlanta, Georgia, USA) Sept. 28
    • H. Yang, X. Meng and S. Lu, Self-organized network layer security in mobile ad hoc networks, in: WiSe '02 (Atlanta, Georgia, USA) (Sept. 28 2002).
    • (2002) WiSe '02
    • Yang, H.1    Meng, X.2    Lu, S.3
  • 56
    • 0036980294 scopus 로고    scopus 로고
    • Securing ad hoc routing protocols
    • Atlanta, Georgia, USA, Sept. 28
    • M.G. Zapata and N. Asokan, Securing Ad hoc Routing Protocols, in: WiSe'02 (Atlanta, Georgia, USA, Sept. 28, 2002).
    • (2002) WiSe'02
    • Zapata, M.G.1    Asokan, N.2
  • 58
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov./Dec.
    • L. Zhou and Z.J. Haas, Securing ad hoc networks, IEEE Network (Nov./Dec. 1999).
    • (1999) IEEE Network
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.