메뉴 건너뛰기




Volumn , Issue , 2005, Pages 113-122

Experimental comparisons between SAODV and AODV routing protocols

Author keywords

Security, routing; Testbed; Wireless ad hoc networks

Indexed keywords

COMPUTER NETWORKS; COMPUTER SIMULATION; MOBILE TELECOMMUNICATION SYSTEMS; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 32144462651     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1089737.1089757     Document Type: Conference Paper
Times cited : (16)

References (33)
  • 1
    • 0742292815 scopus 로고    scopus 로고
    • Ad hoc on-demand distance vector (ADDV) routing
    • July
    • C.E. Perkins, E. Belding-Royer, and S.R. Das, "Ad hoc On-demand Distance Vector (ADDV) routing," IETF RFC 3561, July 2003.
    • (2003) IETF RFC , vol.3561
    • Perkins, C.E.1    Belding-Royer, E.2    Das, S.R.3
  • 3
    • 0036638646 scopus 로고    scopus 로고
    • Scalable routing protocols for mobile ad hoc networks
    • July/Aug.
    • X. Hong, K. Xu, and M. Gerla, "Scalable Routing Protocols for Mobile Ad Hoc Networks," IEEE Network, vol. 16, issue 4, pp. 28-39, July/Aug. 2002.
    • (2002) IEEE Network , vol.16 , Issue.4 , pp. 28-39
    • Hong, X.1    Xu, K.2    Gerla, M.3
  • 4
    • 0035509489 scopus 로고    scopus 로고
    • A survey on position-based routing in mobile ad hoc networks
    • Nov./Dec.
    • M. Mauve, J. Widmer, and H. Hartenstein, "A Survey on Position-based Routing in Mobile Ad Hoc Networks," IEEE Network, vol. 15, issue 6, pp. 30-39, Nov./Dec. 2001.
    • (2001) IEEE Network , vol.15 , Issue.6 , pp. 30-39
    • Mauve, M.1    Widmer, J.2    Hartenstein, H.3
  • 6
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad-hoc networks
    • Atlanta, GA, Sept.
    • Y. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-demand Routing Protocol for Ad-hoc Networks," in Proc. of ACM MobiCom, Atlanta, GA, Sept. 2002.
    • (2002) Proc. of ACM MobiCom
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3
  • 7
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad-hoc networks
    • Boston, MA, Aug.
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad-hoc Networks," in Proc. of ACM MobiCom, Boston, MA, Aug. 2000.
    • (2000) Proc. of ACM MobiCom
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 12
    • 84903836776 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad hoc routing protocols
    • West Point, NY, June
    • P. Ning and K. Sun, "How to Misuse AODV: A Case Study of Insider Attacks Against Mobile Ad hoc Routing Protocols," in Proc. IEEE Information Assurance Workshop, West Point, NY, June 2003.
    • (2003) Proc. IEEE Information Assurance Workshop
    • Ning, P.1    Sun, K.2
  • 14
    • 1542317847 scopus 로고    scopus 로고
    • BISS: Building secure routing out of an incomplete set of security associations
    • San Diego, CA, Sept.
    • S. Capkun and J.P. Hubaux, "BISS: Building Secure Routing out of an Incomplete Set of Security Associations," in Proc. of ACM Workshop on Wireless Security (WiSe '03), San Diego, CA, Sept. 2003.
    • (2003) Proc. of ACM Workshop on Wireless Security (WiSe '03)
    • Capkun, S.1    Hubaux, J.P.2
  • 15
    • 29844454971 scopus 로고    scopus 로고
    • A secure ad-hoc routing approach using localized self-healing communities
    • Urbana-Champaign, May
    • J. Kong, X. Hong, Y. Yi, J.S. Park, J. Liu, and M. Gerla, "A Secure Ad-hoc Routing Approach using Localized Self-Healing Communities," in Proc of. ACM MobiHoc '05, Urbana-Champaign, May 2005.
    • (2005) Proc Of. ACM MobiHoc '05
    • Kong, J.1    Hong, X.2    Yi, Y.3    Park, J.S.4    Liu, J.5    Gerla, M.6
  • 16
    • 0035250366 scopus 로고    scopus 로고
    • Lessons from a full-scale multihop wireless ad hoc network testbed
    • Feb.
    • D. Maltz, J. Broch, and D.B. Johnson, "Lessons from a Full-Scale Multihop Wireless Ad Hoc Network Testbed," IEEE Personal Communications, pp. 8-15, Feb. 2001.
    • (2001) IEEE Personal Communications , pp. 8-15
    • Maltz, D.1    Broch, J.2    Johnson, D.B.3
  • 17
    • 4143059201 scopus 로고    scopus 로고
    • Evaluating the communication performance of an ad hoc wireless network
    • July
    • C.K. Toh, M. Delwar, and D. Allen, "Evaluating the Communication Performance of an Ad Hoc Wireless Network,"IEEE Trans. on Wireless Communications, vol. 1, no. 3, pp. 402-414, July 2002.
    • (2002) IEEE Trans. on Wireless Communications , vol.1 , Issue.3 , pp. 402-414
    • Toh, C.K.1    Delwar, M.2    Allen, D.3
  • 24
    • 32144454953 scopus 로고    scopus 로고
    • Windows XP based AODV from University of Bremen, http://www.aodv.org/
  • 25
    • 0003338167 scopus 로고    scopus 로고
    • The use of HMAC-MD5-96 within ESP and AH
    • Nov.
    • C. Madson and R. Glenn, "The Use of HMAC-MD5-96 within ESP and AH," IETF RFC 2403, Nov. 1998.
    • (1998) IETF RFC , vol.2403
    • Madson, C.1    Glenn, R.2
  • 30
    • 32144442612 scopus 로고    scopus 로고
    • [31 ] ARAN (A Secure Routing Protocol for Ad Hoc Networks)'s implementation: http://signl.cs.umass.edu/arand/
  • 32
    • 11244335412 scopus 로고    scopus 로고
    • Routing in multi-radio, multi-hop wireless mesh networks
    • Philadelphia, Pennsylvania, Sept./Oct.
    • R. Draves, J. Padhye, and B. Zill, "Routing in Multi-Radio, Multi-hop Wireless Mesh Networks," in Proc. ACM MobiCom '04, Philadelphia, Pennsylvania, Sept./Oct. 2004.
    • (2004) Proc. ACM MobiCom '04
    • Draves, R.1    Padhye, J.2    Zill, B.3
  • 33
    • 25844513674 scopus 로고    scopus 로고
    • Architecture and algorithms for an ieee 802.11-based multi-channel wireless mesh network
    • Miami, Florida, March
    • A. Raniwala and T.C. Chiueh, "Architecture and Algorithms for an IEEE 802.11-based Multi-Channel Wireless Mesh Network," in Proc. of IEEE Infocom '05, Miami, Florida, March 2005.
    • (2005) Proc. of IEEE Infocom '05
    • Raniwala, A.1    Chiueh, T.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.