메뉴 건너뛰기




Volumn 2005, Issue 5, 2005, Pages 731-742

Authentication based on multilayer clustering in ad hoc networks

Author keywords

Ad hoc network; Authentication; Cluster head; Clustering; Multilayer

Indexed keywords

COPYRIGHTS; MULTILAYERS; NETWORK PROTOCOLS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33746827782     PISSN: 16871472     EISSN: 16871499     Source Type: Journal    
DOI: 10.1155/WCN.2005.731     Document Type: Article
Times cited : (6)

References (20)
  • 1
    • 0012517119 scopus 로고    scopus 로고
    • Cluster based routing protocol (CBRP) functional specification
    • MANET working group, August
    • M. Jiang, J. Li, and Y. C. Tay, "Cluster based routing protocol (CBRP) functional specification," IETF internet draft, MANET working group, August 1999, http://www.comp.nus.edu.sg/~tayyc/cbrp/draft-ietf-manet-cbrp-spec- 01.txt.
    • (1999) IETF Internet Draft
    • Jiang, M.1    Li, J.2    Tay, Y.C.3
  • 2
    • 0042976442 scopus 로고    scopus 로고
    • Multi-level hierarchies for scalable Ad Hoc routing
    • E. M. Belding-Royer, "Multi-level hierarchies for scalable Ad Hoc routing," Wireless Networks, vol. 9, no. 5, pp. 461-478, 2003.
    • (2003) Wireless Networks , vol.9 , Issue.5 , pp. 461-478
    • Belding-Royer, E.M.1
  • 7
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc networks
    • L. Zhou and Z. J. Haas, "Securing Ad Hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 8
    • 0003208326 scopus 로고    scopus 로고
    • Cluster-based networks
    • C. E. Perkins, Ed., chapter 4, Addison-Wesley, Reading, Mass, USA
    • M. Steenstrup, "Cluster-based networks," in Ad Hoc Networking, C. E. Perkins, Ed., chapter 4, pp. 75-138, Addison-Wesley, Reading, Mass, USA, 2000.
    • (2000) Ad Hoc Networking , pp. 75-138
    • Steenstrup, M.1
  • 10
    • 0017416837 scopus 로고
    • Hierarchical routing for large networks: Performance evaluation and optimization
    • L. Kleinrock and F. Kamoun, "Hierarchical routing for large networks: performance evaluation and optimization," Computer Networks, vol. 1, no. 3, pp. 155-174, 1977.
    • (1977) Computer Networks , vol.1 , Issue.3 , pp. 155-174
    • Kleinrock, L.1    Kamoun, F.2
  • 14
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 15
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc network
    • L. Zhou and Z. J. Hass, "Securing Ad Hoc network," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Hass, Z.J.2
  • 16
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Proc. 9th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '89), G. Brassard, Ed., Springer, Santa Barbara, Calif, USA, August
    • Y. G. Desmedt and Y. Frankel, "Threshold cryptosystems," in Proc. 9th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '89), G. Brassard, Ed., vol. 435 of Lecture Notes in Computer Science, pp. 307-315, Springer, Santa Barbara, Calif, USA, August 1990.
    • (1990) Lecture Notes in Computer Science , vol.435 , pp. 307-315
    • Desmedt, Y.G.1    Frankel, Y.2
  • 18
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Proc. International Cryptology Conference on Advances in Cryptology (CRYPTO '84), Springer, Santa Barbara, Calif, USA, August
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. International Cryptology Conference on Advances in Cryptology (CRYPTO '84), vol. 196 of Lecture Notes in Computer Science, pp. 47-53, Springer, Santa Barbara, Calif, USA, August 1985.
    • (1985) Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1
  • 19
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Proc. 21st Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '01), Springer, Santa Barbara, Calif, USA, August
    • D. Boneh and M. K. Franklin, "Identity-based encryption from the Weil pairing," in Proc. 21st Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '01), vol. 2139 of Lecture Notes in Computer Science, pp. 213-229, Springer, Santa Barbara, Calif, USA, August 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 20
    • 0242334164 scopus 로고    scopus 로고
    • Minimizing communication costs in hierarchically-clustered networks of wireless sensors
    • S. Bandyopadhyay and E. J. Coyle, "Minimizing communication costs in hierarchically-clustered networks of wireless sensors," Computer Networks, vol. 44, no. 1, pp. 1-16, 2004.
    • (2004) Computer Networks , vol.44 , Issue.1 , pp. 1-16
    • Bandyopadhyay, S.1    Coyle, E.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.