메뉴 건너뛰기




Volumn 2, Issue , 2005, Pages 5-8

Designing secure wireless mobile ad hoc networks

Author keywords

Secure MANET; Secure routing; Wireless mobile routing

Indexed keywords

COMPUTER AIDED DESIGN; CRYPTOGRAPHY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; ROUTERS; SECURITY SYSTEMS;

EID: 33744488833     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2005.159     Document Type: Conference Paper
Times cited : (13)

References (22)
  • 2
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Apr
    • Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," presented at IEEE INFOCOM 2003, vol. 3, pp. 1976-1986, Apr 2003.
    • (2003) IEEE INFOCOM 2003 , vol.3 , pp. 1976-1986
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 7
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in wireless ad hoc networks
    • Oct
    • H. Deng, W. Li, and D. P.Agrawal, "Routing Security in Wireless Ad Hoc Networks," in IEEE Communications Magazine, vol. 40(10), pp. 70- 75, Oct 2002.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 70-75
    • Deng, H.1    Li, W.2    Agrawal, D.P.3
  • 12
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May
    • Y. C. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," in IEEE Security and Privacy, vol. 2(3), pp. 28 - 39, May 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.C.1    Perrig, A.2
  • 13
    • 10744229755 scopus 로고    scopus 로고
    • Routing and security in mobile ad hoc networks
    • Feb
    • N. Milanovic, M. Malek, A. Davidson, and V. Milutinovic, "Routing and Security in Mobile Ad Hoc Networks," in IEEE Computer, vol. 37(2), pp. 61- 65, Feb 2004.
    • (2004) IEEE Computer , vol.37 , Issue.2 , pp. 61-65
    • Milanovic, N.1    Malek, M.2    Davidson, A.3    Milutinovic, V.4
  • 14
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • Feb
    • H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," in IEEE Wireless Communications, vol. 11(1), pp. 38- 47, Feb 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 17
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The dynamic source routing protocol for multihop wireless ad hoc networks
    • C. E.Perkins, Ed.: Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA
    • D. B. Johnson, D. A. Maltz, and J. Broch, "DSR: the dynamic source routing protocol for multihop wireless ad hoc networks," in Ad hoc Networking, C. E.Perkins, Ed.: Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 2001, pp. 139-172
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2    Broch, J.3
  • 18
    • 0035249889 scopus 로고    scopus 로고
    • Performance comparison of two on-demand routing protocols for ad hoc networks
    • Feb
    • C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina, "Performance Comparison of two On-demand Routing Protocols for Ad hoc Networks," IEEE Personal Communications, vol. 8(1), pp. 16 - 28, Feb 2001.
    • (2001) IEEE Personal Communications , vol.8 , Issue.1 , pp. 16-28
    • Perkins, C.E.1    Royer, E.M.2    Das, S.R.3    Marina, M.K.4
  • 19
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad hoc mobile wireless networks
    • Apr
    • E. M. Royer and C. K. Toh, "A review of current routing protocols for ad hoc mobile wireless networks," IEEE Personal Communications, vol. 6(2), pp. 46 - 55, Apr 1999.
    • (1999) IEEE Personal Communications , vol.6 , Issue.2 , pp. 46-55
    • Royer, E.M.1    Toh, C.K.2
  • 20
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct
    • A. D. Wood and J. A. Stankovic, "Denial of Service in Sensor Networks," in IEEE Computer, vol. 35(10), pp. 54-62, Oct 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 22
    • 0003839495 scopus 로고
    • Ph.D. Thesis. Department of Computer Science, University of Stirling
    • Marsh S., Formalizing Trust as a Computational Concept. Ph.D. Thesis. Department of Computer Science, University of Stirling, 1994.
    • (1994) Formalizing Trust As A Computational Concept
    • Marsh, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.