메뉴 건너뛰기




Volumn 10, Issue 4, 2008, Pages

ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks

Author keywords

Ad hoc wireless networks; Byzantine failures; On demand routing; Security

Indexed keywords

ADAPTIVE PROBING TECHNIQUES; BYZANTINE FAILURES; BYZANTINE RESILIENT ROUTING PROTOCOLS; ON-DEMAND ROUTING; WIRELESS AD HOC NETWORKS;

EID: 39149117709     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1284680.1341892     Document Type: Article
Times cited : (115)

References (49)
  • 2
    • 39149129262 scopus 로고    scopus 로고
    • 1999a. IEEE Std 802.11a-1999. http://standards.ieee.org/.
    • 1999a. IEEE Std 802.11a-1999. http://standards.ieee.org/.
  • 3
    • 39149108008 scopus 로고    scopus 로고
    • 1999b. IEEE Std 802.11b-1999. http://standards.ieee.org/.
    • 1999b. IEEE Std 802.11b-1999. http://standards.ieee.org/.
  • 4
    • 84965066515 scopus 로고    scopus 로고
    • Advanced Encryption Standard
    • AES
    • AES. 2001. Advanced Encryption Standard. Number FIPS 197. National Institute for Standards and Technology (NIST). http://csrc.nist.gov/encryption/ aes/.
    • (2001) Number FIPS , vol.197
  • 8
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks
    • ACM, New York
    • BUCHEGGER, S. AND BOUDEC, J.-Y. L. 2002. Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks. In Proc. of MobiHoc. ACM, New York, 226-236.
    • (2002) Proc. of MobiHoc , pp. 226-236
    • BUCHEGGER, S.1    BOUDEC, J.-Y.L.2
  • 9
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • BUTTYAN, L. AND HUBAUX, J.-P. 2003. Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. 8, 5, 579-592.
    • (2003) Mob. Netw. Appl , vol.8 , Issue.5 , pp. 579-592
    • BUTTYAN, L.1    HUBAUX, J.-P.2
  • 10
    • 0013294745 scopus 로고    scopus 로고
    • Protecting routing infrastructures from denial of service using cooperative intrusion detection
    • CHEUNG, S. AND LEVITT, K. 1997. Protecting routing infrastructures from denial of service using cooperative intrusion detection. In New Security Paradigms Workshop.
    • (1997) New Security Paradigms Workshop
    • CHEUNG, S.1    LEVITT, K.2
  • 12
    • 77952404217 scopus 로고    scopus 로고
    • Digital Signature Standard
    • DSS
    • DSS. 2006. Digital Signature Standard. Number FIPS 186-3. National Institute for Standards and Technology (NIST). http://csrc.nist.gov/ publications/dra.fts/fips_186-3/Draft-FIPS-186-3_March2006.pdf.
    • (2006) Number FIPS , pp. 186-193
  • 13
    • 46149096001 scopus 로고    scopus 로고
    • Truelink: A practical countermeasure to the wormhole attack in wireless networks
    • ERIKSSON, J., KRISHNAMURTHY, S.-V, AND FALOUTSOS, M. 2006. Truelink: A practical countermeasure to the wormhole attack in wireless networks. Proc. of ICNP'06.
    • (2006) Proc. of ICNP'06
    • ERIKSSON, J.1    KRISHNAMURTHY, S.-V.2    FALOUTSOS, M.3
  • 15
    • 0013091373 scopus 로고    scopus 로고
    • The Keyed-Hash Message Authentication Code
    • HMAC
    • HMAC. 2002. The Keyed-Hash Message Authentication Code. Number FIPS 198. National Institute for Standards and Technology (NIST). http://csrc.nist.gov/publications/fips/index.html.
    • (2002) Number FIPS , vol.198
  • 22
    • 0003897853 scopus 로고    scopus 로고
    • IEEE, 1999 Edition
    • IEEE. 1999. IEEE Std 802.11, 1999 Edition, http://standards.ieee. org/catalog/olis/lanman.html.
    • (1999) IEEE Std 802.11
  • 24
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
    • Addison-Wesley, Reading, MA. Chapter 5, 139-172
    • JOHNSON, D. B., MALTZ, D. A., AND BROCH, J. 2001. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, in Ad Hoc Networking. Addison-Wesley, Reading, MA. Chapter 5, 139-172.
    • (2001) Ad Hoc Networking
    • JOHNSON, D.B.1    MALTZ, D.A.2    BROCH, J.3
  • 29
    • 0036980106 scopus 로고    scopus 로고
    • LUNDGREN, H., NORDSTRÖM, E., AND TSCHUDIN, C. 2002. Coping with communication gray zones in ieee 802.11b based ad hoc networks. In Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM). ACM Press, New York, 49-55.
    • LUNDGREN, H., NORDSTRÖM, E., AND TSCHUDIN, C. 2002. Coping with communication gray zones in ieee 802.11b based ad hoc networks. In Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM). ACM Press, New York, 49-55.
  • 37
    • 0003582910 scopus 로고    scopus 로고
    • Addison-Wesley, Reading, MA. Chapter Ad hoc On-Demand Distance Vector Routing
    • PERKINS, C. E. AND ROYER, E. M. 2000. Ad hoc Networking. Addison-Wesley, Reading, MA. Chapter Ad hoc On-Demand Distance Vector Routing.
    • (2000) Ad hoc Networking
    • PERKINS, C.E.1    ROYER, E.M.2
  • 38
    • 39149134181 scopus 로고    scopus 로고
    • PERLMAN, R. 1988. Network layer protocols with byzantine robustness. Ph.D. thesis, MIT LCS TR-429.
    • PERLMAN, R. 1988. Network layer protocols with byzantine robustness. Ph.D. thesis, MIT LCS TR-429.
  • 39
    • 33750333793 scopus 로고    scopus 로고
    • Routing with byzantine robustness
    • Tech. Rep. TR-2005-146, Sun Microsystems
    • PERLMAN, R. 2005. Routing with byzantine robustness. Tech. Rep. TR-2005-146, Sun Microsystems.
    • (2005)
    • PERLMAN, R.1
  • 41
    • 0017930809 scopus 로고    scopus 로고
    • RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 2 (Feb.), 120-126.
    • RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 2 (Feb.), 120-126.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.