메뉴 건너뛰기




Volumn , Issue , 2006, Pages 387-394

Secure, Disjoint, Multipath Source Routing Protocol(SDMSR) for Mobile Ad-hoc Networks

Author keywords

MANET; Multipath; Routing; Security

Indexed keywords

AD HOC NETWORKS; PROBLEM SOLVING; ROUTING ALGORITHMS; SECURITY SYSTEMS;

EID: 38649120863     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GCC.2006.86     Document Type: Conference Paper
Times cited : (23)

References (28)
  • 4
    • 38649140383 scopus 로고    scopus 로고
    • Bootstrapping security associations for routing in mobile ad-hoc networks
    • May
    • Rekesh Babu Bobba, Laurent Eschenauer, Virgil Gligor, and William Arbaugh. Bootstrapping security associations for routing in mobile ad-hoc networks, May 2002.
    • (2002)
    • Babu Bobba, R.1    Eschenauer, L.2    Gligor, V.3    Arbaugh, W.4
  • 7
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Y. Hu, D. Johnson, and A. Perrig. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1:175-192, 2003.
    • (2003) Ad Hoc Networks , vol.1 , pp. 175-192
    • Hu, Y.1    Johnson, D.2    Perrig, A.3
  • 9
    • 5044238739 scopus 로고    scopus 로고
    • CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • Portoroz, Slovenia, 22 September
    • Michiardi, Pietro, Molva, and Refik. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In CMS'2002, Communication and Multimedia Security 2002 Conference, Portoroz, Slovenia, 22 September 2002.
    • (2002) CMS'2002, Communication and Multimedia Security 2002 Conference
    • Michiardi, P.1    Molva2    Refik3
  • 11
    • 3042667172 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • Technical Report TR01384, Department of Computer Scince, Rice University, June
    • Y. Hu, A. Perrig, and D. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. Technical Report TR01384, Department of Computer Scince, Rice University, June 2002.
    • (2002)
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 14
    • 0034844688 scopus 로고    scopus 로고
    • Split multipath routing with maximally disjoint paths in ad hoc networks
    • S. Lee and M. Gerla. Split multipath routing with maximally disjoint paths in ad hoc networks. In Proceedings of the IEEE ICC, pages 3201-3205, 2001.
    • (2001) Proceedings of the IEEE ICC , pp. 3201-3205
    • Lee, S.1    Gerla, M.2
  • 15
    • 3042547159 scopus 로고    scopus 로고
    • Secure multipath communication in mobile ad hoc networks
    • 02:405
    • Mike Burmester and Tri Van Le. Secure multipath communication in mobile ad hoc networks. itcc, 02:405, 2004.
    • (2004) itcc
    • Burmester, M.1    Van Le, T.2
  • 16
    • 25144467845 scopus 로고    scopus 로고
    • Performance analysis of secure multipath routing protocols for mobile ad hoc networks
    • Douligeris C. Mavropodi R., Kotzanikolaou P. Performance analysis of secure multipath routing protocols for mobile ad hoc networks. WICC, 3510:269-278, 2005.
    • (2005) WICC , vol.3510 , pp. 269-278
    • Douligeris, C.1    Mavropodi, R.2    Kotzanikolaou, P.3
  • 17
    • 25144473813 scopus 로고    scopus 로고
    • Secure multipath routing for mobile ad hoc networks
    • 00:89-96
    • Panayiotis Kotzanikolaou, Rosa Mavropodi, and Christos Douligeris. Secure multipath routing for mobile ad hoc networks. wons, 00:89-96, 2005.
    • (2005) wons
    • Kotzanikolaou, P.1    Mavropodi, R.2    Douligeris, C.3
  • 18
    • 35048869579 scopus 로고    scopus 로고
    • Multipath routing in mobile ad hoc networks: Issues and challenges
    • Stephen Mueller, Rose P. Tsang, and Dipak Ghosal. Multipath routing in mobile ad hoc networks: Issues and challenges. Lecture Notes in Computer Science, 2965:209-234, 1 2004.
    • (2004) Lecture Notes in Computer Science , vol.2965 , Issue.209-234 , pp. 1
    • Mueller, S.1    Tsang, R.P.2    Ghosal, D.3
  • 19
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Leslie Lamport. Password authentication with insecure communication. Commun. ACM, 24(11):770-772, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 21
    • 2442582716 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector routing
    • Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing. SIGMOBILE Mob. Comput. Commun. Rev., 6(3): 106-107, 2002.
    • (2002) SIGMOBILE Mob. Comput. Commun. Rev , vol.6 , Issue.3 , pp. 106-107
    • Guerrero Zapata, M.1
  • 24
    • 7744238188 scopus 로고    scopus 로고
    • Wormhole protection in wireless ad hoc networks
    • Technical Report TR01-384, Department of Computer Science.Rice University
    • Adrian Perrig, Yih-Chun Hu, and David B. Johnson. Wormhole protection in wireless ad hoc networks. Technical Report TR01-384, Department of Computer Science.Rice University, 2001.
    • (2001)
    • Perrig, A.1    Hu, Y.-C.2    Johnson, D.B.3
  • 25
    • 4544314577 scopus 로고    scopus 로고
    • Admission control in peer-to-peer: Design and performance evaluation
    • New York, NY, USA, ACM Press
    • Nitesh Saxena, Gene Tsudik, and Jeong Hyun Yi. Admission control in peer-to-peer: design and performance evaluation. In SASN '03, pages 104-113, New York, NY, USA, 2003. ACM Press.
    • (2003) SASN '03 , pp. 104-113
    • Saxena, N.1    Tsudik, G.2    Hyun Yi, J.3
  • 26
    • 38649102081 scopus 로고
    • Performance of symmetric ciphers and oneway hash functions
    • London, UK, Springer-Verlag
    • Michael Roe. Performance of symmetric ciphers and oneway hash functions. In Fast Software Encryption, Cambridge Security Workshop, pages 83-89, London, UK, 1994. Springer-Verlag.
    • (1994) Fast Software Encryption, Cambridge Security Workshop , pp. 83-89
    • Roe, M.1
  • 27
    • 0033892676 scopus 로고    scopus 로고
    • Performance comparison of two on-demand routing protocols for ad hoc networks
    • Samir Ranjan Das, Charles E. Perkins, and Elizabeth E. Royer. Performance comparison of two on-demand routing protocols for ad hoc networks. In INFOCOM (1), pages 3-12, 2000.
    • (2000) INFOCOM , vol.1 , pp. 3-12
    • Ranjan Das, S.1    Perkins, C.E.2    Royer, E.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.