메뉴 건너뛰기




Volumn 24, Issue 2, 2006, Pages 261-273

SCAN: Self-organized network-layer security in mobile ad hoc networks

Author keywords

Mobile ad hoc network; Network layer security; Self organized security

Indexed keywords

MOBILE AD HOC NETWORKS; NETWORK-LAYER SECURITY; SELF-ORGANIZED SECURITY;

EID: 33144479525     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2005.861384     Document Type: Article
Times cited : (119)

References (28)
  • 1
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. ACM MobiCom, 2000, pp. 255-265.
    • (2000) Proc. ACM MobiCom , pp. 255-265
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 2
    • 0035789229 scopus 로고    scopus 로고
    • The quest for security in mobile ad hoc networks
    • J. Hubaux, L. Buttyan, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proc. ACM MobiHoc, 2001, pp. 146-155.
    • (2001) Proc. ACM MobiHoc , pp. 146-155
    • Hubaux, J.1    Buttyan, L.2    Capkun, S.3
  • 3
    • 0035704362 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for MANET
    • J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing robust and ubiquitous security support for MANET," in Proc. IEEE ICNP, 2001, pp. 251-260.
    • (2001) Proc. IEEE ICNP , pp. 251-260
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 4
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proc. ACM MobiCom, 2002, pp. 12-23.
    • (2002) Proc. ACM MobiCom , pp. 12-23
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 5
    • 84961572484 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Jun.
    • Y. Hu, D. Johnson, and A. Perrig, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," in Proc. IEEE WMCSA, Jun. 2002, pp. 3-13.
    • (2002) Proc. IEEE WMCSA , pp. 3-13
    • Hu, Y.1    Johnson, D.2    Perrig, A.3
  • 6
    • 0013138682 scopus 로고    scopus 로고
    • Secure routing for mobile ad hoc networks
    • P. Papadimitratos and Z. Haas, "Secure routing for mobile ad hoc networks," in Proc. CNDS, 2002, pp. 193-204.
    • (2002) Proc. CNDS , pp. 193-204
    • Papadimitratos, P.1    Haas, Z.2
  • 8
    • 0036980294 scopus 로고    scopus 로고
    • Securing ad hoc routing protocols
    • M. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proc. ACM WiSe, 2002, pp. 1-10.
    • (2002) Proc. ACM WiSe , pp. 1-10
    • Zapata, M.1    Asokan, N.2
  • 9
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Jan.
    • S. Capkun, L. Buttyan, and J. Hubaux, "Self-organized public-key management for mobile ad hoc networks," IEEE Trans. Mobile Comput., vol. 2, no. 1, pp. 52-64, Jan. 2003.
    • (2003) IEEE Trans. Mobile Comput. , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.3
  • 11
    • 34347349933 scopus 로고    scopus 로고
    • Ad hoc on-demand distance vector routing
    • C. Perkins and E. Royer, "Ad hoc on-demand distance vector routing," in Proc. IEEE WMCSA, 1999, pp. 90-100.
    • (1999) Proc. IEEE WMCSA , pp. 90-100
    • Perkins, C.1    Royer, E.2
  • 12
    • 85106319926 scopus 로고    scopus 로고
    • A performance comparison of multi-hop wireless ad hoc network routing protocols
    • J. Broch, D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva, "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proc. ACM MobiCom, 1998, pp. 85-97.
    • (1998) Proc. ACM MobiCom , pp. 85-97
    • Broch, J.1    Maltz, D.2    Johnson, D.3    Hu, Y.4    Jetcheva, J.5
  • 13
    • 0013094264 scopus 로고    scopus 로고
    • Ad hoc on demand distance vector (AODV) Routin
    • draft-ietf-manet-aodv-10.txt
    • C. Perkins, E. Royer, and S. Das, "Ad hoc on demand distance vector (AODV) Routin," Internet Draft, draft-ietf-manet-aodv-10.txt, 2002.
    • (2002) Internet Draft
    • Perkins, C.1    Royer, E.2    Das, S.3
  • 14
    • 0033892676 scopus 로고    scopus 로고
    • Performance comparison of two on-demand routing protocols for ad hoc networks
    • S. Das, C. Perkins, and E. Royer, "Performance comparison of two on-demand routing protocols for ad hoc networks," in Proc. IEEE INFOCOM, 2003, pp. 3-12.
    • (2003) Proc. IEEE INFOCOM , pp. 3-12
    • Das, S.1    Perkins, C.2    Royer, E.3
  • 17
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," in Proc. IEEE INFOCOM, 2003, pp. 1976-1986.
    • (2003) Proc. IEEE INFOCOM , pp. 1976-1986
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 18
    • 15744368857 scopus 로고    scopus 로고
    • Efficient and secure source authentication for multicast
    • A. Perrig, R. Canetti, D. Song, and J. Tygar, "Efficient and secure source authentication for multicast," in Proc. NDSS, 2001, pp. 35-46.
    • (2001) Proc. NDSS , pp. 35-46
    • Perrig, A.1    Canetti, R.2    Song, D.3    Tygar, J.4
  • 19
    • 0242527340 scopus 로고    scopus 로고
    • A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
    • N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, "A charging and rewarding scheme for packet forwarding in multi-hop cellular networks," in Proc. ACM MobiHoc, 2003, pp. 13-24.
    • (2003) Proc. ACM MobiHoc , pp. 13-24
    • Salem, N.1    Buttyan, L.2    Hubaux, J.3    Jakobsson, M.4
  • 20
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • Oct.
    • L. Buttyan and J. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," ACM/Kluwer Mobile Netw. Applicat., vol. 8, no. 5, pp. 579-592, Oct. 2003.
    • (2003) ACM/Kluwer Mobile Netw. Applicat. , vol.8 , Issue.5 , pp. 579-592
    • Buttyan, L.1    Hubaux, J.2
  • 21
    • 1542299118 scopus 로고    scopus 로고
    • Ad hoc-VCG: A truthful and cost- Efficient routing protocol for mobile ad hoc networks with selfish agents
    • S. Eidenbenz and L. Anderegg, "Ad hoc-VCG: A truthful and cost- efficient routing protocol for mobile ad hoc networks with selfish agents, " in Proc. ACM MobiCom, 2003, pp. 245-259.
    • (2003) Proc. ACM MobiCom , pp. 245-259
    • Eidenbenz, S.1    Anderegg, L.2
  • 22
    • 1542360013 scopus 로고    scopus 로고
    • Detection and handling of MAC layer misbehavior in wireless networks
    • Jun.
    • P. Kyasanur and N. Vaidya, "Detection and handling of MAC layer misbehavior in wireless networks," in Proc. IEEE DSN, Jun. 2003, pp. 173-182.
    • (2003) Proc. IEEE DSN , pp. 173-182
    • Kyasanur, P.1    Vaidya, N.2
  • 23
    • 0042014530 scopus 로고    scopus 로고
    • Random waypoint considered harmful
    • J. Yoon, M. Liu, and B. Noble, "Random waypoint considered harmful," in Proc. IEEE INFOCOM, 2003, pp. 1312-1321.
    • (2003) Proc. IEEE INFOCOM , pp. 1312-1321
    • Yoon, J.1    Liu, M.2    Noble, B.3
  • 24
    • 85031307530 scopus 로고
    • Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
    • C. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," in Proc. ACM SIGCOMM, 1994, pp. 234-244.
    • (1994) Proc. ACM SIGCOMM , pp. 234-244
    • Perkins, C.1    Bhagwat, P.2
  • 25
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • J. Douceur, "The Sybil attack," in Proc. IPTPS, 2002, pp. 251-260.
    • (2002) Proc. IPTPS , pp. 251-260
    • Douceur, J.1
  • 26
    • 0242527339 scopus 로고    scopus 로고
    • Mobility helps security in ad hoc networks
    • S. Capkun, J. Hubaux, and L. Buttyan, "Mobility helps security in ad hoc networks," in Proc ACM MobiHoc, 2003, pp. 46-56.
    • (2003) Proc ACM MobiHoc , pp. 46-56
    • Capkun, S.1    Hubaux, J.2    Buttyan, L.3
  • 28
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Y. Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks," in Proc. ACM MOBICOM, 2000, pp. 275-283.
    • (2000) Proc. ACM MOBICOM , pp. 275-283
    • Zhang, Y.1    Lee, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.