메뉴 건너뛰기




Volumn 6, Issue 7, 2008, Pages 1134-1150

HEAP: A packet authentication scheme for mobile ad hoc networks

Author keywords

HMAC; Hop by hop packet authentication; MANET security; NMAC

Indexed keywords

ACCESS CONTROL; ALGORITHMS; AUTHENTICATION; BOOLEAN FUNCTIONS; COMPUTER CRIME; COMPUTER NETWORKS; EVOLUTIONARY ALGORITHMS; METROPOLITAN AREA NETWORKS; NETWORK PROTOCOLS; SCHEDULING ALGORITHMS; SENSOR NETWORKS; SENSORS; TELECOMMUNICATION NETWORKS; WIRELESS SENSOR NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 46449089099     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2007.11.002     Document Type: Article
Times cited : (29)

References (22)
  • 1
    • 46449105101 scopus 로고    scopus 로고
    • A. Aresenault, S. Turner, Internet x.509 public key infrastructure: PKIX roadmap, Ietf internet draft, PKIX Working Group, 2000.
    • A. Aresenault, S. Turner, Internet x.509 public key infrastructure: PKIX roadmap, Ietf internet draft, PKIX Working Group, 2000.
  • 2
    • 46449110519 scopus 로고    scopus 로고
    • M. Bellare, R. Canetti, H. Krawczyk, Keying hash functions for message authentication, in: Proceedings of Advances in Cryptology, 1996.
    • M. Bellare, R. Canetti, H. Krawczyk, Keying hash functions for message authentication, in: Proceedings of Advances in Cryptology, 1996.
  • 3
    • 0031703272 scopus 로고    scopus 로고
    • K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, R.A. Olsson, Detecting disruptive routers: a distributed network monitoring approach, in: IEEE Symposium on Security and Privacy, 1998.
    • K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, R.A. Olsson, Detecting disruptive routers: a distributed network monitoring approach, in: IEEE Symposium on Security and Privacy, 1998.
  • 4
    • 46449104788 scopus 로고    scopus 로고
    • S. Cheung, K. Levitt, Protecting routing infrastructures from denial of service using cooperative intrusion detection, in: New Security Paradigms Workshop, 1997.
    • S. Cheung, K. Levitt, Protecting routing infrastructures from denial of service using cooperative intrusion detection, in: New Security Paradigms Workshop, 1997.
  • 5
    • 46449107508 scopus 로고    scopus 로고
    • B. Dahill, B. Levine, E. Royer, C. Shields, A secure routing protocol for ad-hoc networks, in: Proceedings of the 10th Conference on Network Protocols (ICNP), 2002.
    • B. Dahill, B. Levine, E. Royer, C. Shields, A secure routing protocol for ad-hoc networks, in: Proceedings of the 10th Conference on Network Protocols (ICNP), 2002.
  • 6
    • 0038341106 scopus 로고    scopus 로고
    • L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in: ACM CCS, 2002.
    • L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in: ACM CCS, 2002.
  • 7
    • 84961572484 scopus 로고    scopus 로고
    • Y. Hu, D. Johnson, A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, in: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), Calicoon, NY, 2002.
    • Y. Hu, D. Johnson, A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, in: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), Calicoon, NY, 2002.
  • 8
    • 85177222268 scopus 로고    scopus 로고
    • Y. Hu, A. Perrig, D. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: Proceedings of Mobicom, 2002.
    • Y. Hu, A. Perrig, D. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: Proceedings of Mobicom, 2002.
  • 9
    • 46449138284 scopus 로고    scopus 로고
    • UCLA Parallel Computing Lab, GloMoSim.
    • UCLA Parallel Computing Lab, GloMoSim.
  • 10
    • 0036924499 scopus 로고    scopus 로고
    • On-demand multicast routing protocol in multihop wireless mobile networks
    • Lee S., Su W., and Gerla M. On-demand multicast routing protocol in multihop wireless mobile networks. Mobile Networks and Applications 7 6 (2002) 441-453
    • (2002) Mobile Networks and Applications , vol.7 , Issue.6 , pp. 441-453
    • Lee, S.1    Su, W.2    Gerla, M.3
  • 11
    • 24744455885 scopus 로고    scopus 로고
    • A lightweight authentication protocol for mobile ad hoc networks
    • Lu B., and Pooch U.W. A lightweight authentication protocol for mobile ad hoc networks. International Journal of Information Technology 11 2 (2005) 119-135
    • (2005) International Journal of Information Technology , vol.11 , Issue.2 , pp. 119-135
    • Lu, B.1    Pooch, U.W.2
  • 12
    • 84883869163 scopus 로고    scopus 로고
    • H. Luo, P. Zerfos, J. Kong, S. Lu, L. Zhang, Self-securing ad hoc wireless networks, in: IEEE ISCC (IEEE Symposium on Computers and Communications), July 2002.
    • H. Luo, P. Zerfos, J. Kong, S. Lu, L. Zhang, Self-securing ad hoc wireless networks, in: IEEE ISCC (IEEE Symposium on Computers and Communications), July 2002.
  • 13
    • 85177504463 scopus 로고    scopus 로고
    • S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, 2000, pp. 255-265.
    • S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, 2000, pp. 255-265.
  • 14
    • 46449102577 scopus 로고    scopus 로고
    • P. Papadimitratos, Z. Haas, Secure routing for mobile ad hoc networks, in: Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002.
    • P. Papadimitratos, Z. Haas, Secure routing for mobile ad hoc networks, in: Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002.
  • 15
    • 46449105100 scopus 로고    scopus 로고
    • R. Perlman, Network Layer Protocols with Byzantine Robustness, Ph.D. Thesis, MIT, October 1988, LCS TR-429.
    • R. Perlman, Network Layer Protocols with Byzantine Robustness, Ph.D. Thesis, MIT, October 1988, LCS TR-429.
  • 16
    • 0033690336 scopus 로고    scopus 로고
    • A. Perrig, R. Canetti, J. Tygar, D. Song, Efficient authentication and signing of multicast streams over lossy channels, in: Proceedings of IEEE Symposium on Security and Privacy, May 2000.
    • A. Perrig, R. Canetti, J. Tygar, D. Song, Efficient authentication and signing of multicast streams over lossy channels, in: Proceedings of IEEE Symposium on Security and Privacy, May 2000.
  • 17
    • 85177210396 scopus 로고    scopus 로고
    • A. Perrig, R. Szewcyzk, V. Wen, D. Culler, J.D. Tygar, Spins: security protocols for sensor networks, in: Proceedings of Mobile Computing and Networking, 2001.
    • A. Perrig, R. Szewcyzk, V. Wen, D. Culler, J.D. Tygar, Spins: security protocols for sensor networks, in: Proceedings of Mobile Computing and Networking, 2001.
  • 18
    • 0242492056 scopus 로고    scopus 로고
    • G.V.S. Raju, R. Akbani, Elliptic curve cryptosystem and its applications, in: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics (IEEE-SMC), 2003.
    • G.V.S. Raju, R. Akbani, Elliptic curve cryptosystem and its applications, in: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics (IEEE-SMC), 2003.
  • 19
    • 0036979313 scopus 로고    scopus 로고
    • G.V.S. Raju, G. Hernandez, Routing in ad hoc networks, in: IEEE-SMC International Conference, October 2002.
    • G.V.S. Raju, G. Hernandez, Routing in ad hoc networks, in: IEEE-SMC International Conference, October 2002.
  • 21
    • 84943529186 scopus 로고    scopus 로고
    • S. Zhu, S. Xu, S. Setia, S. Jajodia, LHAP: a light-weight hop-by-hop authentication protocol for ad-hoc networks, in: Proceedings of the 23rd ICDCS Workshop, 2003.
    • S. Zhu, S. Xu, S. Setia, S. Jajodia, LHAP: a light-weight hop-by-hop authentication protocol for ad-hoc networks, in: Proceedings of the 23rd ICDCS Workshop, 2003.
  • 22
    • 33745197327 scopus 로고    scopus 로고
    • Lhap: a lightweight network access control protocol for ad-hoc networks
    • Zhu S., Xu S., Setia S., and Jajodia Z. Lhap: a lightweight network access control protocol for ad-hoc networks. Ad Hoc Networks Journal 4 5 (2006) 567-585
    • (2006) Ad Hoc Networks Journal , vol.4 , Issue.5 , pp. 567-585
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.