메뉴 건너뛰기




Volumn , Issue , 2007, Pages 61-70

Surviving attacks on disruption-tolerant networks without authentication

Author keywords

Deployment; DTN; Mobility; Routing; Security

Indexed keywords

MESSAGE PASSING; PUBLIC KEY CRYPTOGRAPHY; ROBUSTNESS (CONTROL SYSTEMS); ROUTING PROTOCOLS; SECURITY OF DATA;

EID: 37849034148     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1288107.1288116     Document Type: Conference Paper
Times cited : (78)

References (35)
  • 3
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • D. Boneh and M. Franklin. Identity based encryption from the Weil pairing. SIAM Journal of Computing, 32(3):586-615, 2003.
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 4
    • 11244250305 scopus 로고    scopus 로고
    • The Effect of Rumor Spreading in Reputation Systems for Mobile Ad hoc Networks
    • S. Buchegger and J. Le Boudec. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad hoc Networks. In Proc. WiOpt, pages 131-140, 2003.
    • (2003) Proc. WiOpt , pp. 131-140
    • Buchegger, S.1    Le Boudec, J.2
  • 9
    • 0035158929 scopus 로고    scopus 로고
    • Wearable Computers and Packet Transport Mechanisms in Highly Partitioned Ad hoc Networks
    • October
    • J. Davis, A. Fagg, and B. N. Levine. Wearable Computers and Packet Transport Mechanisms in Highly Partitioned Ad hoc Networks. In Proc. IEEE Intl. Symp on Wearable Computers (ISWC), pages 141-148, October 2001.
    • (2001) Proc. IEEE Intl. Symp on Wearable Computers (ISWC) , pp. 141-148
    • Davis, J.1    Fagg, A.2    Levine, B.N.3
  • 13
    • 70349312732 scopus 로고    scopus 로고
    • Locating Peers With Ease: Mobility Diffusion Of Last Encounters In Ad hoc Networks
    • April
    • M. Grossglauser and M. Vetterli. Locating Peers With Ease: Mobility Diffusion Of Last Encounters In Ad hoc Networks. In Proc. IEEE Infocom, April 2003.
    • (2003) Proc. IEEE Infocom
    • Grossglauser, M.1    Vetterli, M.2
  • 14
    • 41349120887 scopus 로고    scopus 로고
    • Attack Vulnerability of Complex Networks
    • May
    • P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han. Attack Vulnerability of Complex Networks. APS Physics Review E, 65(5):056109.1-056109.14, May 2002.
    • (2002) APS Physics Review E , vol.65 , Issue.5
    • Holme, P.1    Kim, B.J.2    Yoon, C.N.3    Han, S.K.4
  • 15
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks. Wireless Networks, 11(1-2):21-38, 2005.
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 17
    • 21844451437 scopus 로고    scopus 로고
    • Routing in a Delay Tolerant Network
    • August
    • S. Jain, K. Fall, and R. Patra. Routing in a Delay Tolerant Network. In Proc. ACM SIGCOMM, pages 145-158, August 2004.
    • (2004) Proc. ACM SIGCOMM , pp. 145-158
    • Jain, S.1    Fall, K.2    Patra, R.3
  • 18
    • 0036949534 scopus 로고    scopus 로고
    • Energy-Efficient Computing for Wildlife Tracking: Design tradeoffs and early experiences with ZebraNet
    • P. Juang et al. Energy-Efficient Computing for Wildlife Tracking: design tradeoffs and early experiences with ZebraNet. SIGOPS Oper. Syst. Rev., 36(5):96-107, 2002.
    • (2002) SIGOPS Oper. Syst. Rev , vol.36 , Issue.5 , pp. 96-107
    • Juang, P.1
  • 19
    • 29844454971 scopus 로고    scopus 로고
    • A Secure Ad hoc Routing Approach Using Localized Self-Healing Communities
    • May
    • J. Kong, X. Hong, Y. Yi, J.-S. Park, J. Liu, and M. Gerla. A Secure Ad hoc Routing Approach Using Localized Self-Healing Communities. In Proc. ACM MobiHoc, pages 254-265, May 2005.
    • (2005) Proc. ACM MobiHoc , pp. 254-265
    • Kong, J.1    Hong, X.2    Yi, Y.3    Park, J.-S.4    Liu, J.5    Gerla, M.6
  • 21
    • 0034545825 scopus 로고    scopus 로고
    • Sending Messages to Mobile Users in Disconnected Ad hoc Wireless Networks
    • August
    • Q. Li and D. Rus. Sending Messages to Mobile Users in Disconnected Ad hoc Wireless Networks. In Proc. MobiCom, pages 44-55, August 2000.
    • (2000) Proc. MobiCom , pp. 44-55
    • Li, Q.1    Rus, D.2
  • 25
    • 0742285890 scopus 로고    scopus 로고
    • DakNet: Rethinking Connectivity in Developing Nations
    • Jan
    • A. Pentland, R. Fletcher, and A. Hasson. DakNet: Rethinking Connectivity in Developing Nations. IEEE Computer, 37(1):78-83, Jan 2004.
    • (2004) IEEE Computer , vol.37 , Issue.1 , pp. 78-83
    • Pentland, A.1    Fletcher, R.2    Hasson, A.3
  • 32
    • 37849041028 scopus 로고    scopus 로고
    • Study of a Bus-Based Disruption Tolerant Network: Mobility Modeling and Impact on Routing
    • September
    • X. Zhang, J. Kurose, B. N. Levine, D. Towsley, and H. Zhang. Study of a Bus-Based Disruption Tolerant Network: Mobility Modeling and Impact on Routing. In Proc. ACM Mobicom, September 2007.
    • (2007) Proc. ACM Mobicom
    • Zhang, X.1    Kurose, J.2    Levine, B.N.3    Towsley, D.4    Zhang, H.5
  • 34
    • 37849012219 scopus 로고    scopus 로고
    • W. Zhao, M. Ammar, and E. Zegura. A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad hoc Networks. In Proc. ACM Mobihoc, May 2004.
    • W. Zhao, M. Ammar, and E. Zegura. A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad hoc Networks. In Proc. ACM Mobihoc, May 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.