메뉴 건너뛰기




Volumn 5, Issue 7, 2007, Pages 1055-1072

An overlay approach to data security in ad-hoc networks

Author keywords

Ad hoc networks; Measurements; Overlay networks; P2P; Security

Indexed keywords

COMPUTER SOFTWARE; CRYPTOGRAPHY; HAND HELD COMPUTERS; NETWORK PROTOCOLS; SECURITY OF DATA; THROUGHPUT;

EID: 34249284866     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2006.05.017     Document Type: Article
Times cited : (22)

References (27)
  • 1
    • 34249296225 scopus 로고    scopus 로고
    • HyperCast website, 2005. .
  • 2
    • 34249341626 scopus 로고    scopus 로고
    • The spanning tree protocol, Design Documents, 2005. Available from: .
  • 3
    • 34249312218 scopus 로고    scopus 로고
    • D. Aguayo, J. Bicket, S. Biswas, G. Judd, R. Morris, Link-level measurements from an 802.11b mesh network, in: Proceedings of the ACM Sigcomm'04, August 2004.
  • 4
    • 33646435708 scopus 로고    scopus 로고
    • Effective location-guided overlay multicast in mobile ad hoc networks, Group communications in ad hoc networks
    • Chen K., and Nahrstedt K. Effective location-guided overlay multicast in mobile ad hoc networks, Group communications in ad hoc networks. International Journal of Wireless and Mobile Computing 1 8 (2005)
    • (2005) International Journal of Wireless and Mobile Computing , vol.1 , Issue.8
    • Chen, K.1    Nahrstedt, K.2
  • 6
    • 1542359009 scopus 로고    scopus 로고
    • D.S.J. De Couto, D. Aguayo, J. Bicket, R. Morris, A high-throughput path metric for multi-hop wireless routing, in: Proceedings of the ACM MobiCom'03, September 2003.
  • 7
    • 34249337991 scopus 로고    scopus 로고
    • R. Draves, J. Padhye, B. Zill, Comparison of routing metrics for static multi-hop wireless networks, in: Proceedings of ACM Sigcomm'04, August 2004.
  • 8
    • 34249280510 scopus 로고    scopus 로고
    • M. Ge, S.V. Krishnamurthy, M. Faloutsos, Overlay multicasting for ad hoc networks, in: Proceedings of Third Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), Bordum, Turkey, 2004.
  • 9
    • 84907682275 scopus 로고    scopus 로고
    • C. Gui, P. Mohapatra, Efficient overlay multicast for mobile ad hoc networks, in: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), March 2003, pp. 1118-1123.
  • 10
    • 78049330406 scopus 로고    scopus 로고
    • Y.C. Hu, S.M. Das, H. Pucha, Exploiting the synergy between peer-to-peer and mobile ad hoc networks, in: Proceedings of 9th Workshop on Hot Topics in Operating Systems (HotOS IX), May 2003.
  • 11
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • Hu Y.-C., and Perrig A. A survey of secure wireless ad hoc routing. IEEE Security and Privacy 2 3 (2004) 28-39
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.-C.1    Perrig, A.2
  • 12
    • 0037001639 scopus 로고    scopus 로고
    • Y.C. Hu, D.B. Johnson, Design and demonstration of live audio and video over multihop wireless ad hoc networks, in: Proceedings of IEEE Milcom'02, 2002.
  • 13
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: attacks and countermeasures
    • Karlof C., and Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks (Elsevier) 1 3 (2003) 293-315
    • (2003) Ad Hoc Networks (Elsevier) , vol.1 , Issue.3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 14
    • 34249293960 scopus 로고    scopus 로고
    • H. Lundgren, E. Nordstrom, C. Tschudin, Coping with communication grayzones in IEEE 802.11b, in: Proceedings of 5th ACM International Workshop on Wireless Mobile Multimedia (WoWMoM 2002), September 2002.
  • 15
    • 11244320485 scopus 로고    scopus 로고
    • Ursa: Ubiquitous and robust access control for mobile ad hoc networks
    • Luo H., Kong J., Zerfos P., Lu S., and Zhang L. Ursa: Ubiquitous and robust access control for mobile ad hoc networks. ACM/IEEE Transactions on Networking 13 6 (2004) 1049-1063
    • (2004) ACM/IEEE Transactions on Networking , vol.13 , Issue.6 , pp. 1049-1063
    • Luo, H.1    Kong, J.2    Zerfos, P.3    Lu, S.4    Zhang, L.5
  • 16
    • 34347349933 scopus 로고    scopus 로고
    • C.E. Perkins, E.M. Royer, Ad-hoc on-demand distance vector routing, in: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, February 1999, pp. 90-100.
  • 17
    • 0022209638 scopus 로고    scopus 로고
    • R. Perlman, An algorithm for distributed computation of spanning trees in an extended LAN, in: in Proceedings of 9th Data Communications Symposium, September 1985, pp. 44-53.
  • 18
    • 0242583965 scopus 로고    scopus 로고
    • Protocol for dynamic ad-hoc networks using distributed spanning trees
    • Radhakrishnan S., and Racherla G. Protocol for dynamic ad-hoc networks using distributed spanning trees. Wireless Networks 9 (2003) 673-686
    • (2003) Wireless Networks , vol.9 , pp. 673-686
    • Radhakrishnan, S.1    Racherla, G.2
  • 19
    • 34249318337 scopus 로고    scopus 로고
    • R. Shollmeier, I. Gruber, M. Finkenzeller, Routing in mobile ad-hoc and peer-to-peer networks: a comparison, in: Proceedings of International Workshop on Peer-to-Peer Computing, Pisa, Italy, May 2002.
  • 21
    • 34249277712 scopus 로고    scopus 로고
    • D. Wallner, E. Harder, R. Agee, Key management for multicast: issues and architectures, IETF RFC 2627, June 1999.
  • 22
    • 10744219662 scopus 로고    scopus 로고
    • Prioritized overlay multicast in mobile ad hoc environments
    • Xiao L., et al. Prioritized overlay multicast in mobile ad hoc environments. IEEE Computer 37 2 (2004) 67-74
    • (2004) IEEE Computer , vol.37 , Issue.2 , pp. 67-74
    • Xiao, L.1
  • 23
    • 0034780938 scopus 로고    scopus 로고
    • Y.R. Yang, X.S. Li, X.B. Zhang, S.S. Lam, Reliable group rekeying: a performance analysis, in: Proceedings of ACM Sigcomm, August 2001, pp. 27-38.
  • 24
    • 84954505973 scopus 로고    scopus 로고
    • M. Yarvis, W.S. Conner, L. Krishnamurthy, Real-world experience with an interactive ad hoc sensor network, in: Proceedings of the International Workshop on Ad Hoc Networks, August 2002.
  • 25
    • 0031652485 scopus 로고    scopus 로고
    • X. Zeng, R. Bagrodia, M. Gerla, Glomosim: A library for parallel simulation of large-scale wireless networks, in: Proceedings of Workshop on Parallel and Distributed Simulation, 1998, pp. 154-161.
  • 26
    • 27944492020 scopus 로고    scopus 로고
    • X.B. Zhang, S.S. Lam, H. Liu, Efficient group rekeying using application-layer multicast, in: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), June 2005.
  • 27
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L., and Haas Z.J. Securing ad hoc networks. IEEE Network 13 6 (1999) 24-30
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.