메뉴 건너뛰기




Volumn 20, Issue 8, 2007, Pages 909-925

Ad hoc network routing and security: A review

Author keywords

Network; Routing; Security

Indexed keywords

AD HOC NETWORKS; CRYPTOGRAPHY; LOCAL AREA NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 34547505939     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.840     Document Type: Review
Times cited : (40)

References (68)
  • 2
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L, Haas Z. Securing ad hoc networks. IEEE Network 1999; 13(6):24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 8
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • Mobile Agents and Security, Springer: Berlin, 1419
    • Sander T, Tschudin CF. Protecting mobile agents against malicious hosts. Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419. Springer: Berlin, 1998; 1419:44-60.
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 44-60
    • Sander, T.1    Tschudin, C.F.2
  • 12
    • 34547499301 scopus 로고    scopus 로고
    • IEEE Standard Specifications for Public-Key Cryptography IEEE Std 1363-2000
    • IEEE Standard Specifications for Public-Key Cryptography (IEEE Std 1363-2000). 2000. http://www.ieee.org
    • (2000)
  • 18
    • 3042645880 scopus 로고    scopus 로고
    • Optimized link state routing protocol
    • October
    • Clausen T, Jacquet P. Optimized link state routing protocol. Request for Comments 3626, October 2003.
    • (2003) Request for Comments , vol.3626
    • Clausen, T.1    Jacquet, P.2
  • 19
    • 4444282195 scopus 로고    scopus 로고
    • Topology dissemination based on reverse-path forwarding (TBRPF)
    • February
    • Ogier R et al. Topology dissemination based on reverse-path forwarding (TBRPF). Request for Comments 3684, February 2004.
    • (2004) Request for Comments , vol.3684
    • Ogier, R.1
  • 20
    • 0031353437 scopus 로고    scopus 로고
    • Park V, Corson M. A Highly adaptive distributed routing algorithm for mobile wireless networks. Proceedings of IEEE INFOCOM '97, 3, Kobe, Japan, April 1997; 1405-1413.
    • Park V, Corson M. A Highly adaptive distributed routing algorithm for mobile wireless networks. Proceedings of IEEE INFOCOM '97, vol. 3, Kobe, Japan, April 1997; 1405-1413.
  • 22
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks, mobile computing
    • Imielinski T, Korth H eds, Kluwer Academic Publishers: Dordrecht
    • Johnson DB, Maltz DA. Dynamic source routing in ad hoc wireless networks, mobile computing. In Mobile Computing, Imielinski T, Korth H (eds). Kluwer Academic Publishers: Dordrecht, 1996; 153-181.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 23
    • 0003582407 scopus 로고    scopus 로고
    • Cluster based routing protocol (CBRP)
    • internet-draft, August
    • Jiang M, Li J, Tay YC. Cluster based routing protocol (CBRP). IETF MANET Working Group, internet-draft, August 1999.
    • (1999) IETF MANET Working Group
    • Jiang, M.1    Li, J.2    Tay, Y.C.3
  • 25
    • 4444308329 scopus 로고    scopus 로고
    • Using labeled paths for loop-free on-demand routing in ad hoc networks
    • Roppongi, Japan, May
    • Rangarajan H, Garcia-Luna-Aceves JJ. Using labeled paths for loop-free on-demand routing in ad hoc networks, Proceedings of the 5th ACM MOBIHOC, Roppongi, Japan, May 2004; 43-54.
    • (2004) Proceedings of the 5th ACM MOBIHOC , pp. 43-54
    • Rangarajan, H.1    Garcia-Luna-Aceves, J.J.2
  • 26
    • 0035249889 scopus 로고    scopus 로고
    • Performance comparison of two on-demand routing protocols for ad hoc networks
    • Perkins C, Royer EM, Das SR, Marina MK. Performance comparison of two on-demand routing protocols for ad hoc networks. IEEE Personal Communication 2001; 8(1):16-28.
    • (2001) IEEE Personal Communication , vol.8 , Issue.1 , pp. 16-28
    • Perkins, C.1    Royer, E.M.2    Das, S.R.3    Marina, M.K.4
  • 28
    • 0035392857 scopus 로고    scopus 로고
    • A survey of energy efficient network protocols for wireless networks
    • Jones CE, Sivalingam KM, Agrawal P, Chen JC. A survey of energy efficient network protocols for wireless networks, Wireless Networks 2001; 7(4):343-358,
    • (2001) Wireless Networks , vol.7 , Issue.4 , pp. 343-358
    • Jones, C.E.1    Sivalingam, K.M.2    Agrawal, P.3    Chen, J.C.4
  • 33
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad hoc mobile wireless networks
    • Royer EM, Toh CK. A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communication 1999; 6(2):46-55.
    • (1999) IEEE Personal Communication , vol.6 , Issue.2 , pp. 46-55
    • Royer, E.M.1    Toh, C.K.2
  • 34
    • 0003361860 scopus 로고    scopus 로고
    • Ns notes and documentation
    • Fall K, Varadhan K ed, UC Berkeley, LBL, USC/ISI, and Xerox PARC, November, available from
    • Fall K, Varadhan K (ed). Ns notes and documentation. The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, November 1997, available from http://www-mash.cs.berkeley.edu/ns/
    • (1997) The VINT Project
  • 35
    • 0027693935 scopus 로고
    • Diversity coding for transparent self-healing and fault-tolerant communication networks,
    • Ayanoglu E, Chih-Lin I, Gitlin RD, Mazo JE. Diversity coding for transparent self-healing and fault-tolerant communication networks,' IEEE Transactions on Communication 1993; 41(11): 1677-1686.
    • (1993) IEEE Transactions on Communication , vol.41 , Issue.11 , pp. 1677-1686
    • Ayanoglu, E.1    Chih-Lin, I.2    Gitlin, R.D.3    Mazo, J.E.4
  • 39
    • 0032026045 scopus 로고    scopus 로고
    • SNMP and SNMPv2: The infrastructure for network management
    • Stallings W. SNMP and SNMPv2: the infrastructure for network management. IEEE Communication Magazine 1998; 36(3):37-43.
    • (1998) IEEE Communication Magazine , vol.36 , Issue.3 , pp. 37-43
    • Stallings, W.1
  • 42
    • 0004198635 scopus 로고    scopus 로고
    • 2nd edn, Prentice-Hall: Englewood Cliffs, NJ
    • Pfleeger CP. Security in Computing (2nd edn). Prentice-Hall: Englewood Cliffs, NJ, 1997.
    • (1997) Security in Computing
    • Pfleeger, C.P.1
  • 43
    • 0036957315 scopus 로고    scopus 로고
    • ARIADNE: A secure on-demand routing protocol for ad hoc networks
    • Atlanta, GA, U.S.A, September
    • Hu Y, Perrig A, Johnson D. ARIADNE: a secure on-demand routing protocol for ad hoc networks. In Proceedings of the MobiCom, Atlanta, GA, U.S.A., September 2002; 12-23,
    • (2002) Proceedings of the MobiCom , pp. 12-23
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 44
    • 84961572484 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Callicoon, NY, U.S.A, June
    • Hu Y, Johnson D, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In Proceedings of the WMCSA, Callicoon, NY, U.S.A., June 2002; 3-13.
    • (2002) Proceedings of the WMCSA , pp. 3-13
    • Hu, Y.1    Johnson, D.2    Perrig, A.3
  • 49
    • 34547539676 scopus 로고    scopus 로고
    • Policy-based authentication and authorization: Secure access to the network infrastructure
    • New Orleans, LA, U.S.A, December
    • Hayes J. Policy-based authentication and authorization: secure access to the network infrastructure. 16th Annual Computer Security Applications Conference, New Orleans, LA, U.S.A., December 2000; 328-333.
    • (2000) 16th Annual Computer Security Applications Conference , pp. 328-333
    • Hayes, J.1
  • 50
    • 0035271246 scopus 로고    scopus 로고
    • Authenticated ad hoc routing at the link layer for mobile systems
    • Binkley J. Authenticated ad hoc routing at the link layer for mobile systems. Wireless Networks 2001; 7(2):139-145.
    • (2001) Wireless Networks , vol.7 , Issue.2 , pp. 139-145
    • Binkley, J.1
  • 54
    • 34547545411 scopus 로고    scopus 로고
    • Palm, Inc
    • Palm, Inc., 2005, http://www.palm.com
    • (2005)
  • 56
  • 57
    • 0017930809 scopus 로고
    • A method for obtaining signatures and public-key cryptosystems
    • Rivest R, Shamir A, Adleman L. A method for obtaining signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2):120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 61
    • 33847273536 scopus 로고    scopus 로고
    • A new secure routing protocol to defend byzantine attacks for ad hoc networks
    • Kuala Lumpur, Malaysia, 16-18 November
    • Yu M, Kulkarni S, Lau P. A new secure routing protocol to defend byzantine attacks for ad hoc networks. IEEE International Conference on Networks (ICON), vol. 2, Kuala Lumpur, Malaysia, 16-18 November 2005; 1126-1131.
    • (2005) IEEE International Conference on Networks (ICON) , vol.2 , pp. 1126-1131
    • Yu, M.1    Kulkarni, S.2    Lau, P.3
  • 66
    • 34547504981 scopus 로고    scopus 로고
    • IPv6 Organization
    • IPv6 Organization, 2005. http://www.ipv6.org
    • (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.