메뉴 건너뛰기




Volumn 15, Issue 6, 2007, Pages 1490-1501

Distributed algorithms for secure multipath routing in attack-resistant networks

Author keywords

Attack resistant networks; Maximum flow problems; Multipath channels; Multipath routing; Optimization; Preflow push; Resilience; Routing; Security; Telecommunication security

Indexed keywords

ACCESS CONTROL; MULTIPATH PROPAGATION; NETWORK ARCHITECTURE; OPTIMIZATION; PARALLEL ALGORITHMS; ROUTING PROTOCOLS;

EID: 37549009866     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2007.897956     Document Type: Article
Times cited : (52)

References (33)
  • 1
    • 0022807426 scopus 로고
    • Algorithms for the minimax transportation problem
    • R. K. Ahuja, "Algorithms for the minimax transportation problem," Naval Research Logistics Quarterly, vol. 33, pp. 725-740, 1986.
    • (1986) Naval Research Logistics Quarterly , vol.33 , pp. 725-740
    • Ahuja, R.K.1
  • 4
    • 17744392825 scopus 로고    scopus 로고
    • The power of tuning: A novel approach for the efficient design of survivable networks
    • Oct
    • R. Banner and A. Orda, "The power of tuning: A novel approach for the efficient design of survivable networks," in Proc. 12th IEEE Int. Conf. Network Protocols (ICNP 2004), Oct. 2004, pp. 2-11.
    • (2004) Proc. 12th IEEE Int. Conf. Network Protocols (ICNP 2004) , pp. 2-11
    • Banner, R.1    Orda, A.2
  • 6
    • 25844507197 scopus 로고    scopus 로고
    • Minimax models for diverse routing
    • Winter
    • J. P. Brumbaugh-Smith and D. R. Shier, "Minimax models for diverse routing," INFORMS J. Comput., vol. 14, no. 1, pp. 81-95, Winter, 2002.
    • (2002) INFORMS J. Comput , vol.14 , Issue.1 , pp. 81-95
    • Brumbaugh-Smith, J.P.1    Shier, D.R.2
  • 8
    • 0032673944 scopus 로고    scopus 로고
    • Accessing multiple mirror sites in parallel: Using Tornado codes to speed up downloads
    • Mar
    • J. Byers, M. Luby, and M. Mitzenmacher, "Accessing multiple mirror sites in parallel: Using Tornado codes to speed up downloads," in Proc. IEEE INFOCOM, Mar. 1999, pp. 275-283.
    • (1999) Proc. IEEE INFOCOM , pp. 275-283
    • Byers, J.1    Luby, M.2    Mitzenmacher, M.3
  • 11
    • 0024610615 scopus 로고
    • A fast parametric maximum flow algorithm and applications
    • Feb
    • G. Gallo, M. D. Grigoriadis, and R. E. Tarjan, "A fast parametric maximum flow algorithm and applications," SIAM J. Comput., vol. 18, no. 1, pp. 30-55, Feb. 1989.
    • (1989) SIAM J. Comput , vol.18 , Issue.1 , pp. 30-55
    • Gallo, G.1    Grigoriadis, M.D.2    Tarjan, R.E.3
  • 12
    • 0035789268 scopus 로고    scopus 로고
    • Highly-resilient, energy-efficient multipath routing in wireless sensor networks
    • Oct
    • D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, "Highly-resilient, energy-efficient multipath routing in wireless sensor networks," ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 5, no. 4, pp. 11-25, Oct. 2001.
    • (2001) ACM SIGMOBILE Mobile Comput. Commun. Rev , vol.5 , Issue.4 , pp. 11-25
    • Ganesan, D.1    Govindan, R.2    Shenker, S.3    Estrin, D.4
  • 14
    • 0031210477 scopus 로고    scopus 로고
    • A self-stabilizing algorithm for the maximum flow problem
    • S. Ghosh, A. Gupta, and S. V. Pemmaraju, "A self-stabilizing algorithm for the maximum flow problem," Distrib. Comput., vol. 10, no. 3, pp. 167-180, 1997.
    • (1997) Distrib. Comput , vol.10 , Issue.3 , pp. 167-180
    • Ghosh, S.1    Gupta, A.2    Pemmaraju, S.V.3
  • 16
    • 0024090156 scopus 로고
    • A new approach to the maximum-flow problem
    • Oct
    • A. V. Goldberg and R. E. Tarjan, "A new approach to the maximum-flow problem," J. Assoc. Comput. Machin. (ACM), vol. 35, no. 4, pp. 921-940, Oct. 1988.
    • (1988) J. Assoc. Comput. Machin. (ACM) , vol.35 , Issue.4 , pp. 921-940
    • Goldberg, A.V.1    Tarjan, R.E.2
  • 17
    • 0034276273 scopus 로고    scopus 로고
    • On load balancing in multicomputer/distributed systems equipped with circuit or cut-through switching capability
    • Sep
    • C.-C. Han, K. G. Shin, and S. K. Yun, "On load balancing in multicomputer/distributed systems equipped with circuit or cut-through switching capability," IEEE Trans. Comput., vol. 49, no. 9, pp. 947-957, Sep. 2000.
    • (2000) IEEE Trans. Comput , vol.49 , Issue.9 , pp. 947-957
    • Han, C.-C.1    Shin, K.G.2    Yun, S.K.3
  • 18
    • 0034852715 scopus 로고    scopus 로고
    • Preliminary results in routing games
    • Jun
    • J. Hespanha and S. Bohacek, "Preliminary results in routing games," in Proc. 2001 Amer. Control Conf., Jun. 2001, vol. 3, pp. 1904-1909.
    • (2001) Proc. 2001 Amer. Control Conf , vol.3 , pp. 1904-1909
    • Hespanha, J.1    Bohacek, S.2
  • 21
    • 0042474230 scopus 로고    scopus 로고
    • Detecting network intrusions via sampling: A game theoretic approach
    • M. Kodialam and T. V. Lakshman, "Detecting network intrusions via sampling: A game theoretic approach," in Proc. IEEE INFOCOM, 2003, pp. 1880-1889.
    • (2003) Proc. IEEE INFOCOM , pp. 1880-1889
    • Kodialam, M.1    Lakshman, T.V.2
  • 22
    • 25844461930 scopus 로고    scopus 로고
    • Distributed algorithms for secure multipath routing
    • P. Lee, V. Misra, and D. Rubenstein, "Distributed algorithms for secure multipath routing," in Proc. IEEE INFOCOM, 2005, pp. 1952-1963.
    • (2005) Proc. IEEE INFOCOM , pp. 1952-1963
    • Lee, P.1    Misra, V.2    Rubenstein, D.3
  • 23
    • 37549000273 scopus 로고    scopus 로고
    • P. Lee, V. Misra, and D. Rubenstein, Distributed algorithms for secure multipath routing in attack-resistant networks, Dept. Comput. Sci. Columbia Univ., New York, Tech. Rep. CUCS-010-07, Feb. 2007.
    • P. Lee, V. Misra, and D. Rubenstein, "Distributed algorithms for secure multipath routing in attack-resistant networks," Dept. Comput. Sci. Columbia Univ., New York, Tech. Rep. CUCS-010-07, Feb. 2007.
  • 25
    • 0036343281 scopus 로고    scopus 로고
    • End-to-end Internet video traffic dynamics: Statistical study and analysis
    • D. Loguinov and H. Radha, "End-to-end Internet video traffic dynamics: Statistical study and analysis," in Proc. IEEE INFOCOM, 2002, pp. 723-732.
    • (2002) Proc. IEEE INFOCOM , pp. 723-732
    • Loguinov, D.1    Radha, H.2
  • 26
    • 4444237581 scopus 로고    scopus 로고
    • SPREAD: Enhancing data confidentiality in mobile ad hoc networks
    • W. Lou, W. Liu, and Y. Fang, "SPREAD: Enhancing data confidentiality in mobile ad hoc networks," in Proc. IEEE INFOCOM, 2004, pp. 2404-2413.
    • (2004) Proc. IEEE INFOCOM , pp. 2404-2413
    • Lou, W.1    Liu, W.2    Fang, Y.3
  • 29
    • 0034836055 scopus 로고    scopus 로고
    • BRITE: An approach to universal topology generation
    • A. Medina, A. Lakhina, I. Matta, and J. Byers, "BRITE: An approach to universal topology generation," in Proc. MASCOTS, 2001, p. 346.
    • (2001) Proc. MASCOTS , pp. 346
    • Medina, A.1    Lakhina, A.2    Matta, I.3    Byers, J.4
  • 33
    • 0035728157 scopus 로고    scopus 로고
    • Improving network security by multi-path traffic dispersion
    • J. Yang and S. Papavassiliou, "Improving network security by multi-path traffic dispersion," in IEEE MILCOM, 2001, pp. 34-38.
    • (2001) IEEE MILCOM , pp. 34-38
    • Yang, J.1    Papavassiliou, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.