메뉴 건너뛰기




Volumn 25, Issue 2, 2006, Pages 121-130

Layered security design for mobile ad hoc networks
[No Author Info available]

Author keywords

Authentication; Link and network layers; Mobile ad hoc networks; Security; Security protocols

Indexed keywords

COMPUTER CRIME; INTERCONNECTION NETWORKS; SECURITY OF DATA;

EID: 33644778783     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2005.09.005     Document Type: Article
Times cited : (25)

References (28)
  • 2
    • 0035178273 scopus 로고    scopus 로고
    • Security enhancements in AODV protocol for wireless ad hoc networks
    • 2001
    • Bhargava S, Agrawal DP. Security enhancements in AODV protocol for wireless ad hoc networks. In: Vehicular technology conference, 2001, vol. 4; 2001. p. 2143-7.
    • (2001) Vehicular Technology Conference , vol.4 , pp. 2143-2147
    • Bhargava, S.1    Agrawal, D.P.2
  • 4
    • 1842794475 scopus 로고    scopus 로고
    • Intercepting mobile communications: The insecurity of 802.11
    • Borisov N, Goldberg I, Wagner D. Intercepting mobile communications: the insecurity of 802.11. In: ACM MOBICON; 2001.
    • (2001) ACM MOBICON
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3
  • 7
    • 33644746750 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Hu Y, Perrig A, Johnson D. Ariadne: a secure on-demand routing protocol for ad hoc networks. In: ACM WiSe; 2002a.
    • (2002) ACM WiSe
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 8
    • 1842693650 scopus 로고    scopus 로고
    • Packet leashes: A defence against wormhole attacks in wireless networks
    • Hu Y, Perrig A, Johnson D. Packet leashes: a defence against wormhole attacks in wireless networks. In: IEEE INFOCOM; 2002b.
    • (2002) IEEE INFOCOM
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 9
    • 1842643244 scopus 로고    scopus 로고
    • Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Hu Y, Johnson D, Perrig A. Sead: secure efficient distance vector routing for mobile wireless ad hoc networks. In: IEEE WMCSA; 2002c.
    • (2002) IEEE WMCSA
    • Hu, Y.1    Johnson, D.2    Perrig, A.3
  • 13
    • 1842643245 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad hoc networks
    • Riverside, USA
    • Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile ad hoc networks. In: IEEE ICNP. Riverside, USA; 2001.
    • (2001) IEEE ICNP
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 21
    • 0742292815 scopus 로고    scopus 로고
    • Ad hoc on-demand distance-vector routing (AODV)
    • Perkins CE, Royer EM. Ad hoc on-demand distance-vector routing (AODV). IETF draft; 2001.
    • (2001) IETF Draft
    • Perkins, C.E.1    Royer, E.M.2
  • 22
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad-hoc mobile wireless networks
    • E.M. Royer, and C.-K. Toh A review of current routing protocols for ad-hoc mobile wireless networks IEEE Personal Communications Magazine 1999 p. 46-55
    • (1999) IEEE Personal Communications Magazine
    • Royer, E.M.1    Toh, C.-K.2
  • 26
    • 84889956484 scopus 로고    scopus 로고
    • Using the Fluhrer, Martin, and Shamir attack to break WEP
    • Stubblefield A, Ioannidis J, Rubin A. Using the Fluhrer, Martin, and Shamir attack to break WEP. In: NDSS; 2002.
    • (2002) NDSS
    • Stubblefield, A.1    Ioannidis, J.2    Rubin, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.