메뉴 건너뛰기




Volumn , Issue , 2003, Pages 21-32

SECTOR: Secure tracking of node encounters in multi-hop wireless networks

Author keywords

Mobile Networks; Mobility; Positioning; Security; Security associations

Indexed keywords

COMPUTATIONAL COMPLEXITY; MOBILE TELECOMMUNICATION SYSTEMS; PROBABILITY; REAL TIME SYSTEMS; SECURITY OF DATA; SYNCHRONIZATION; TOPOLOGY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 4544259841     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (311)

References (28)
  • 2
  • 3
    • 0842326315 scopus 로고    scopus 로고
    • Bootstrapping security associations for routing in mobile Ad-hoc networks
    • University of Maryland, May
    • R.B. Bobba, L. Eschenauer, V.D. Gligor, and W. Arbaugh. Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks. Technical Report TR 2002-44, University of Maryland, May 2002.
    • (2002) Technical Report , vol.TR 2002-44
    • Bobba, R.B.1    Eschenauer, L.2    Gligor, V.D.3    Arbaugh, W.4
  • 5
    • 2642586050 scopus 로고    scopus 로고
    • Performance analysis of the confidant protocol (cooperation of nodes - Fairness in dynamic ad-hoc networks)
    • Lausanne, June
    • S. Buchegger and J. Y. Le Boudec. Performance analysis of the confidant protocol (cooperation of nodes - fairness in dynamic ad-hoc networks). In Proceedings of MobiHoc 2002, Lausanne, June 2002.
    • (2002) Proceedings of MobiHoc 2002
    • Buchegger, S.1    Le Boudec, J.Y.2
  • 9
    • 0013398251 scopus 로고
    • Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them
    • Y. Desmedt. Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them. In SecuriCom'88, 1988.
    • (1988) SecuriCom'88
    • Desmedt, Y.1
  • 10
    • 0242443768 scopus 로고    scopus 로고
    • Age matters: Efficient route discovery in mobile Ad hoc networks using encounter ages
    • H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli. Age Matters: Efficient Route Discovery in Mobile Ad Hoc Networks Using Encounter Ages. In Proceedings of MobiHoc, 2003.
    • (2003) Proceedings of MobiHoc
    • Dubois-Ferriere, H.1    Grossglauser, M.2    Vetterli, M.3
  • 11
    • 0030645662 scopus 로고    scopus 로고
    • Reducing the cost of security in link state routing
    • February
    • Ralf Hauser, Antoni Przygienda, and Gene Tsudik. Reducing the Cost of Security in Link State Routing. In Proceedings of NDSS, February 1997.
    • (1997) Proceedings of NDSS
    • Hauser, R.1    Przygienda, A.2    Tsudik, G.3
  • 12
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • April
    • Y.-C. Hu, Adrian Perrig, and David B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of IEEE Infocom, April 2003.
    • (2003) Proceedings of IEEE Infocom
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 14
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for Ad hoc networks
    • September
    • Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In Proceedings of MobiCom, September 2002.
    • (2002) Proceedings of MobiCom
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 15
    • 84982836904 scopus 로고    scopus 로고
    • Efficient security mechanisms for routing protocols
    • February
    • Y.-C. Hu, A. Perrig, and D. B. Johnson. Efficient Security Mechanisms for Routing Protocols. In Proceedings of NDSS, February 2003.
    • (2003) Proceedings of NDSS
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 23
    • 4544376141 scopus 로고    scopus 로고
    • Time synchronization in Ad hoc networks
    • K. Romer. Time Synchronization in Ad Hoc Networks. In Proceedings of MobiHoc, 2001.
    • (2001) Proceedings of MobiHoc
    • Romer, K.1
  • 25
    • 4544249895 scopus 로고    scopus 로고
    • Secure verification of location claims
    • EECS, University of California, Berkeley
    • Naveen Sastry, Umesh Shankar, and David Wagner. Secure Verification of Location Claims. Technical Report UCB//CSD-03-1245, EECS, University of California, Berkeley, 2003.
    • (2003) Technical Report , vol.UCB-CSD-03-1245
    • Sastry, N.1    Shankar, U.2    Wagner, D.3
  • 27
    • 33750318709 scopus 로고    scopus 로고
    • Proving the location of tamper-resistant devices
    • Princeton University
    • Brent Waters and Ed Felten. Proving the Location of Tamper-Resistant Devices. Technical report, Princeton University.
    • Technical Report
    • Waters, B.1    Felten, Ed.2
  • 28
    • 85180543368 scopus 로고    scopus 로고
    • Efficient protocols for signing routing messages
    • March
    • Kan Zhang. Efficient Protocols for Signing Routing Messages. In Proceedings of NDSS, March 1998.
    • (1998) Proceedings of NDSS
    • Zhang, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.