메뉴 건너뛰기




Volumn 24, Issue 2, 2006, Pages 343-356

Secure data communication in mobile ad hoc networks

Author keywords

Fault tolerance; Mobile ad hoc network (MANET) security; Multipath routing; Network security; Secure data transmission; Secure message transmission; Secure routing

Indexed keywords

MOBILE AD HOC NETWORK (MANET) SECURITY; MULTIHOP WIRELESS NETWORK; SECURE DATA TRANSMISSION; SECURE ROUTING;

EID: 33144467802     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2005.861392     Document Type: Article
Times cited : (116)

References (46)
  • 1
    • 0013138682 scopus 로고    scopus 로고
    • Secure routing for mobile ad hoc networks
    • San Antonio, IX, Jan. 27-31
    • P. Papadimitratos and Z. J. Haas, "Secure routing for mobile ad hoc networks," in Proc. SCS CNDS, San Antonio, IX, Jan. 27-31, 2002, pp. 193-204.
    • (2002) Proc. SCS CNDS , pp. 193-204
    • Papadimitratos, P.1    Haas, Z.J.2
  • 2
    • 0036980294 scopus 로고    scopus 로고
    • Securing ad hoc routing protocols
    • Atlanta, GA, Sep.
    • M. G. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proc. ACM WiSe, Atlanta, GA, Sep. 2002, pp. 1-10.
    • (2002) Proc. ACM WiSe , pp. 1-10
    • Zapata, M.G.1    Asokan, N.2
  • 3
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Atlanta, GA, Sep.
    • Y. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proc. 8th ACM MobiCom, Atlanta, GA, Sep. 2002, pp. 12-23.
    • (2002) Proc. 8th ACM MobiCom , pp. 12-23
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3
  • 4
    • 84904904836 scopus 로고    scopus 로고
    • "A secure routing protocol for ad hoc networks
    • Nov.
    • K. Sanzgiri et al., "A secure routing protocol for ad hoc networks," in Proc. ICNP, Nov. 2002, pp. 78-87.
    • (2002) Proc. ICNP , pp. 78-87
    • Sanzgiri, K.1
  • 6
    • 11244269535 scopus 로고    scopus 로고
    • Secure efficient distance vector routing for mobile wireless ad hoc networks
    • , Jul.
    • Y. Hu, A. Perrig, and D. B. Johnson, "Secure efficient distance vector routing for mobile wireless ad hoc networks," Ad Hoc Networks, vol. 1, no. 1, pp. 175-190, Jul. 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-190
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3
  • 7
    • 33144468829 scopus 로고    scopus 로고
    • Secure QoS-aware route discovery in ad hoc networks
    • Princeton, NJ, Apr.
    • P. Papadimitratos and Z. J. Haas, "Secure QoS-aware route discovery in ad hoc networks," in Proc. 2005 IEEE Sarnoff Symp., Princeton, NJ, Apr. 2005, pp. 176-179.
    • (2005) Proc. 2005 IEEE Sarnoff Symp. , pp. 176-179
    • Papadimitratos, P.1    Haas, Z.J.2
  • 8
    • 33746592166 scopus 로고    scopus 로고
    • Secure on-demand distance-vector routing in ad hoc networks
    • Princeton, NJ, Apr.
    • _, "Secure on-demand distance-vector routing in ad hoc networks," in Proc. 2005 IEEE Sarnoff Symp., Princeton, NJ, Apr. 2005, pp. 168-171.
    • (2005) Proc. 2005 IEEE Sarnoff Symp. , pp. 168-171
  • 9
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the Internet protocol
    • IETF, Nov.
    • S. Kent and R. Atkinson, "Security architecture for the Internet protocol," IETF, RFC 2401, Nov. 1998.
    • (1998) RFC , vol.2401
    • Kent, S.1    Atkinson, R.2
  • 10
    • 0003254362 scopus 로고    scopus 로고
    • IP authentication header
    • IETF, Nov.
    • _, "IP authentication header," IETF, RFC 2402, Nov. 1998.
    • (1998) RFC , vol.2402
  • 11
    • 0003324496 scopus 로고    scopus 로고
    • "Stream control transmission protocol,"
    • IETF, Oct.
    • R. Stewart et al., "Stream control transmission protocol," IETF, RFC 2960, Oct. 2000.
    • (2000) RFC , vol.2960
    • Stewart, R.1
  • 12
    • 0242527360 scopus 로고    scopus 로고
    • Path set selection in mobile ad hoc networks
    • Lausanne, Switzerland, Jun.
    • P. Papadimitratos, Z. J. Haas, and E. G. Sirer, "Path set selection in mobile ad hoc networks," in Proc. 3rd. ACM MobiHoc, Lausanne, Switzerland, Jun. 2002, pp. 1-11.
    • (2002) Proc. 3rd. ACM MobiHoc , pp. 1-11
    • Papadimitratos, P.1    Haas, Z.J.2    Sirer, E.G.3
  • 13
    • 2342588224 scopus 로고    scopus 로고
    • Analysis of multipath routing, Part 1 : The effect on the packet delivery ratio
    • Jan.
    • A. Tsirigos and Z. J. Haas, "Analysis of multipath routing, Part 1 : The effect on the packet delivery ratio," IEEE Trans. Wireless Commun., vol. 3, no. 1, pp. 138-146, Jan. 2004.
    • (2004) IEEE Trans. Wireless Commun. , vol.3 , Issue.1 , pp. 138-146
    • Tsirigos, A.1    Haas, Z.J.2
  • 14
    • 2342625273 scopus 로고    scopus 로고
    • Analysis of multipath routing, Part 2: Mitigation of the effects of frequently changing network topologies
    • Mar.
    • _, "Analysis of multipath routing, Part 2: Mitigation of the effects of frequently changing network topologies," IEEE Trans. Wireless Commun., vol. 3, no. 2, pp. 500-511, Mar. 2004.
    • (2004) IEEE Trans. Wireless Commun. , vol.3 , Issue.2 , pp. 500-511
  • 15
    • 6344273537 scopus 로고    scopus 로고
    • Secure message transmission in mobile ad hoc networks
    • Jul.
    • P. Papadimitratos and Z. J. Haas, "Secure message transmission in mobile ad hoc networks," Elsevier Ad Hoc Netw. J., vol. 1, no. 1, pp. 193-209, Jul. 2003.
    • (2003) Elsevier Ad Hoc Netw. J. , vol.1 , Issue.1 , pp. 193-209
    • Papadimitratos, P.1    Haas, Z.J.2
  • 16
    • 4143090710 scopus 로고    scopus 로고
    • Secure message transmission in mobile ad hoc networks
    • San Diego, CA, Sep.
    • _, "Secure message transmission in mobile ad hoc networks," in Proc. ACM WiSe 2003, San Diego, CA, Sep. 2003, pp. 41-50.
    • (2003) Proc. ACM WiSe 2003 , pp. 41-50
  • 19
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 20
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov./Dec.
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Netw. Mag., vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
    • (1999) IEEE Netw. Mag. , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 21
    • 33144455091 scopus 로고    scopus 로고
    • Secure communication in adverse mobile ad hoc networks
    • D.-Z. Du, Ed. Norwell, MA: Kluwer, Nov.
    • P. Papadimitratos and Z. J. Haas, "Secure communication in adverse mobile ad hoc networks," in Ad Hoc Wireless Networking, D.-Z. Du, Ed. Norwell, MA: Kluwer, Nov. 2003.
    • (2003) Ad Hoc Wireless Networking
    • Papadimitratos, P.1    Haas, Z.J.2
  • 23
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • Apr.
    • M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," J. ACM, vol. 36, no. 2, pp. 335-348, Apr. 1989.
    • (1989) J. ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 24
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • IETF, Feb.
    • H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-hashing for message authentication, IETF, RFC 2104, Feb. 1997.
    • (1997) RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 30
    • 0021506074 scopus 로고
    • Computing k-out-of-n system reliability
    • R. E. Barlow and K. D. Heidtmann, "Computing k-out-of-n system reliability," IEEE Trans. Reliab., vol. R-33, pp. 322-323, 1984.
    • (1984) IEEE Trans. Reliab. , vol.R-33 , pp. 322-323
    • Barlow, R.E.1    Heidtmann, K.D.2
  • 31
    • 0022865215 scopus 로고
    • Utilization of symmetric switching functions in the computation of k-out-of-n system reliability
    • A.M. Rushdi, "Utilization of symmetric switching functions in the computation of k-out-of-n system reliability," Microelectron. Reliab., vol. 26, no. 5, pp. 973-987, 1986.
    • (1986) Microelectron. Reliab. , vol.26 , Issue.5 , pp. 973-987
    • Rushdi, A.M.1
  • 32
    • 0026140443 scopus 로고
    • Comment on: An efficient nonrecursive algorithm for computing the reliability of k-out-of-n systems
    • _, "Comment on: An efficient nonrecursive algorithm for computing the reliability of k-out-of-n systems," IEEE Trans. Reliab., vol. R-40, no. 1, pp. 60-61, 1991.
    • (1991) IEEE Trans. Reliab. , vol.R-40 , Issue.1 , pp. 60-61
  • 33
    • 0242696202 scopus 로고    scopus 로고
    • On the minimum node degree and connectivity of a wireless multihop network
    • Lausanne, Switzerland, Jun.
    • C. Bettstetter, "On the minimum node degree and connectivity of a wireless multihop network," in Proc. 3rd ACM MobiHoc, Lausanne, Switzerland, Jun. 2002, pp. 80-91.
    • (2002) Proc. 3rd ACM MobiHoc , pp. 80-91
    • Bettstetter, C.1
  • 34
    • 85106319926 scopus 로고    scopus 로고
    • A performance comparison of multi-hop wireless ad hoc network routing protocols
    • Dallas, TX, Oct.
    • J. Broch et al., "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proc. 4th ACM MobiCom, Dallas, TX, Oct. 1998, pp. 85-97.
    • (1998) Proc. 4th ACM MobiCom , pp. 85-97
    • Broch, J.1
  • 35
    • 0042014530 scopus 로고    scopus 로고
    • Random-waypoint mobility considered harmful
    • San Francisco, CA, Apr.
    • J. Yoon, M. Liu, and B. Noble, "Random-waypoint mobility considered harmful," in Proc. of IEEE INFOCOM, San Francisco, CA, Apr. 2003, pp. 1312-1321.
    • (2003) Proc. of IEEE INFOCOM , pp. 1312-1321
    • Yoon, J.1    Liu, M.2    Noble, B.3
  • 36
    • 0742292815 scopus 로고    scopus 로고
    • Ad hoc on-demand distance vector (AODV) routing
    • IETF, Jul.
    • C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing," IETF, RFC 3561, Jul. 2002.
    • (2002) RFC , vol.3561
    • Perkins, C.1    Belding-Royer, E.2    Das, S.3
  • 37
    • 1542356511 scopus 로고    scopus 로고
    • The dynamic source routing protocol for mobile ad hoc networks (DSR)
    • draft-ietf-manet-dsr-09.txt, Apr.
    • D. B. Johnson et al., 'The dynamic source routing protocol for mobile ad hoc networks (DSR)," Internet Draft, draft-ietf-manet-dsr-09.txt, Apr. 2003.
    • (2003) Internet Draft
    • Johnson, D.B.1
  • 38
    • 0035415758 scopus 로고    scopus 로고
    • The performance of query control schemes for the zone routing protocol
    • Aug.
    • Z. J. Haas and M. R. Pearlman, "The performance of query control schemes for the zone routing protocol," ACM/IEEE Trans. Netw., vol. 9, no. 4, pp. 427-438, Aug. 2001.
    • (2001) ACM/IEEE Trans. Netw. , vol.9 , Issue.4 , pp. 427-438
    • Haas, Z.J.1    Pearlman, M.R.2
  • 39
    • 84866985446 scopus 로고    scopus 로고
    • Securing the OLSR protocol
    • Jun.
    • T. H. Clausen et al., "Securing the OLSR protocol," in Proc. IFIP MedHoc-Net. 2003, Jun. 2003, pp. 25-35.
    • (2003) Proc. IFIP MedHoc-Net. 2003 , pp. 25-35
    • Clausen, T.H.1
  • 40
    • 2442551009 scopus 로고    scopus 로고
    • Optimized link state routing protocol (OLSR)
    • IETF, Oct.
    • T. H. Clausen and P. Jacquet, "Optimized link state routing protocol (OLSR)," IETF, RFC 3626, Oct. 2003.
    • (2003) RFC , vol.3626
    • Clausen, T.H.1    Jacquet, P.2
  • 41
    • 0242453865 scopus 로고    scopus 로고
    • An on-demand secure routing protocol resilient to Byzantine failures
    • Atlanta, GA, Sep.
    • B. Awerbuch et al., "An on-demand secure routing protocol resilient to Byzantine failures," in Proc. ACM WiSe 2002, Atlanta, GA, Sep. 2002, pp. 21-31.
    • (2002) Proc. ACM WiSe 2002 , pp. 21-31
    • Awerbuch, B.1
  • 42
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Boston, MA, Aug.
    • S. Marti et al., "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th MobiCom, Boston, MA, Aug. 2000, pp. 255-265.
    • (2000) Proc. 6th MobiCom , pp. 255-265
    • Marti, S.1
  • 43
    • 0242696192 scopus 로고    scopus 로고
    • Performance evaluation of the CONFIDANT protocol
    • Lausanne, Switzerland, Jun.
    • S. Buchegger and J. Y. LeBoudec, "Performance evaluation of the CONFIDANT protocol," in Proc. 3rd ACM MobiHoc, Lausanne, Switzerland, Jun. 2002, pp. 226-236.
    • (2002) Proc. 3rd ACM MobiHoc , pp. 226-236
    • Buchegger, S.1    Leboudec, J.Y.2
  • 44
    • 1542326337 scopus 로고    scopus 로고
    • A charging and rewarding scheme for packet forwarding
    • Annapolis, MD, Jun.
    • N. Ben Salem et al., "A charging and rewarding scheme for packet forwarding," in Proc. 4th ACM MobiHoc, Annapolis, MD, Jun. 2003, pp. 13-24.
    • (2003) Proc. 4th ACM MobiHoc , pp. 13-24
    • Ben Salem, N.1
  • 45
    • 5044238739 scopus 로고    scopus 로고
    • CORE: A collaborative reputation mechanism to enforce node cooperation
    • Sep.
    • P. Macciardi and R. Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation," in Proc. 6th IFIP CMS Conf., Sep. 2002, pp. 102-121.
    • (2002) Proc. 6th IFIP CMS Conf. , pp. 102-121
    • Macciardi, P.1    Molva, R.2
  • 46
    • 0031352149 scopus 로고    scopus 로고
    • TCP-Boston: A fragmentation-tolerant TCP protocol for ATM networks
    • Kobe, Japan, Apr.
    • A. Bestavros and G. Kim, 'TCP-Boston: A fragmentation-tolerant TCP protocol for ATM networks," in Proc. IEEE INFOCOM, Kobe, Japan, Apr. 1997, pp. 1210-1217.
    • (1997) Proc. IEEE INFOCOM , pp. 1210-1217
    • Bestavros, A.1    Kim, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.