메뉴 건너뛰기




Volumn 21, Issue 6, 2006, Pages 997-1011

Inter-cluster routing authentication for Ad Hoc networks by a hierarchical key scheme

Author keywords

Ad Hoc network; CA (Certificate Authority); CBSRP; Cluster based; ID based; Inter cluster; PKI

Indexed keywords

AD HOC NETWORKS; CERTIFICATE AUTHORITY (CA); CLUSTER BASED SECURE ROUTING PROTOCOL (CBSRP); INTER CLUSTER ROUTING; INTER CLUSTER ROUTING AUTHENTICATION;

EID: 33845753004     PISSN: 10009000     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11390-006-0997-5     Document Type: Article
Times cited : (6)

References (34)
  • 2
    • 15244362289 scopus 로고    scopus 로고
    • Password-only authenticated key establishment protocol without public key cryptography
    • Feb.
    • Ding L, Lai C S, Huang Y M. Password-only authenticated key establishment protocol without public key cryptography. IEE Electronic Letters, Feb. 2005, 41(4): 185-186.
    • (2005) IEE Electronic Letters , vol.41 , Issue.4 , pp. 185-186
    • Ding, L.1    Lai, C.S.2    Huang, Y.M.3
  • 3
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad hoc networks
    • Asokan N, Ginzboorg P. Key agreement in ad hoc networks. Computer Communications, 2000, 23(17): 1627-1637.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 4
    • 0033748607 scopus 로고    scopus 로고
    • New multiparty authentication services and key agreement protocols
    • April
    • Ateniese G, Steiner M, Tsudik G. New multiparty authentication services and key agreement protocols. IEEE J. Selected Areas in Communications, April 2000, 18(4): 628-639.
    • (2000) IEEE J. Selected Areas in Communications , vol.18 , Issue.4 , pp. 628-639
    • Ateniese, G.1    Steiner, M.2    Tsudik, G.3
  • 5
    • 0035704362 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad-hoc networks
    • Riverside, California, USA, Nov.
    • Kong J, Zerfos P, Luo H et al. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proc. the 9th Int. Conf. Network Protocols, Riverside, California, USA, Nov. 2001, pp.251-260.
    • (2001) Proc. the 9th Int. Conf. Network Protocols , pp. 251-260
    • Kong, J.1    Zerfos, P.2    Luo, H.3
  • 8
    • 26444471877 scopus 로고    scopus 로고
    • Resilient cluster-organizing key management and secure routing protocol for mobile ad hoc networks
    • Sept.
    • Lin H Y, Huang Y M, Wang T I. Resilient cluster-organizing key management and secure routing protocol for mobile ad hoc networks. IEICE Trans. Communications, Sept. 2005, E88-B(9): 3598-3613.
    • (2005) IEICE Trans. Communications , vol.E88-B , Issue.9 , pp. 3598-3613
    • Lin, H.Y.1    Huang, Y.M.2    Wang, T.I.3
  • 9
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov./Dec.
    • Zhou L, Haas Z. Securing ad hoc networks. IEEE Network Magazine, Nov./Dec. 1999, 13(6): 24-30.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 10
    • 2342542302 scopus 로고    scopus 로고
    • CLTC: A cluster-based topology control framework for ad hoc networks
    • Jan.-Feb.
    • Shen C C, Srisathapornphat C, Liu R et al. CLTC: A cluster-based topology control framework for ad hoc networks. IEEE Trans. Mobile Computing, Jan.-Feb. 2004, 3(1): 18-32.
    • (2004) IEEE Trans. Mobile Computing , vol.3 , Issue.1 , pp. 18-32
    • Shen, C.C.1    Srisathapornphat, C.2    Liu, R.3
  • 13
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 15
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Santa Barbara, USA
    • Shamir A. Identity-based cryptosystems and signature schemes. In Proc. CRYPTO, Santa Barbara, USA, 1984, pp.47-53.
    • (1984) Proc. CRYPTO , pp. 47-53
    • Shamir, A.1
  • 16
    • 0003629990 scopus 로고
    • NIST FIPS PUB 180. National Institute of Standards and Technology Draft, U.S. Department of Commerce
    • NIST FIPS PUB 180. Secure hash standard. National Institute of Standards and Technology Draft, U.S. Department of Commerce, 1993.
    • (1993) Secure Hash Standard
  • 19
    • 33745378852 scopus 로고    scopus 로고
    • A secure on-demand source routing with distributed authentication for trust-based ad hoc networks
    • SpringerVerlag
    • Hsieh M Y, Huang Y M. A secure on-demand source routing with distributed authentication for trust-based ad hoc networks. Lecture Notes in Computer Science 3779, SpringerVerlag, 2005, pp.343-350.
    • (2005) Lecture Notes in Computer Science , vol.3779 , pp. 343-350
    • Hsieh, M.Y.1    Huang, Y.M.2
  • 20
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad-hoc mobile wireless networks
    • Apr.
    • Royer E M, Toh C K. A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications Magazine, Apr. 1999, 6(2): 46-55.
    • (1999) IEEE Personal Communications Magazine , vol.6 , Issue.2 , pp. 46-55
    • Royer, E.M.1    Toh, C.K.2
  • 21
    • 0004118142 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • draft-ietfmanet-dsr-07.txt, Oct.
    • Broch J, Johnson D B, Maltz D A. Dynamic source routing in ad hoc wireless networks. IETF, Internet Draft, draft-ietfmanet-dsr-07.txt, Oct. 1999, http://www.ietf.org.
    • (1999) Internet Draft
    • Broch, J.1    Johnson, D.B.2    Maltz, D.A.3
  • 22
    • 8344229909 scopus 로고    scopus 로고
    • A cluster-based security architecture for ad hoc networks
    • Hong Kong, Mar.
    • Bechler M, Hof H J, Kraft D et al. A cluster-based security architecture for ad hoc networks. In Proc. IEEE the Conf. Computer Communications, Hong Kong, Mar. 2004, 23(1): 2393-2403.
    • (2004) Proc. IEEE the Conf. Computer Communications , vol.23 , Issue.1 , pp. 2393-2403
    • Bechler, M.1    Hof, H.J.2    Kraft, D.3
  • 28
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Jan.
    • Capkun S, Buttyan L, Hubaux J P. Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Computing, Jan. 2003, 2(1): 52-64.
    • (2003) IEEE Trans. Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.P.3
  • 30
    • 17144398990 scopus 로고    scopus 로고
    • MOCA: Mobile certificate authority for wireless ad hoc networks
    • Gaithersburg, Maryland, Apr.
    • Yi S, Kravets R. MOCA: Mobile certificate authority for wireless ad hoc networks. In Proc. the 2nd Annual PKI Research Workshop Program, Gaithersburg, Maryland, Apr. 2003, pp.52-64.
    • (2003) Proc. the 2nd Annual PKI Research Workshop Program , pp. 52-64
    • Yi, S.1    Kravets, R.2
  • 31
    • 84888068366 scopus 로고    scopus 로고
    • Two implementation methods of a 1024-bit RSA cryptoprocessor based on modified Montgomery algorithm
    • Sydney, Australia, May
    • Kwon T W, You C S, Heo W S et al. Two implementation methods of a 1024-bit RSA cryptoprocessor based on modified Montgomery algorithm. In Proc. IEEE Int. Symp. Circuits and Systems, Sydney, Australia, May 2001, pp.650-653.
    • (2001) Proc. IEEE Int. Symp. Circuits and Systems , pp. 650-653
    • Kwon, T.W.1    You, C.S.2    Heo, W.S.3
  • 33
    • 4544360748 scopus 로고
    • NS-2. (last accessed March 12 2004)
    • NS-2. The network simulator. 1989 (last accessed March 12 2004), http://www.isi.edu/ /nsnam/ns/.
    • (1989) The Network Simulator


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.