메뉴 건너뛰기




Volumn , Issue , 2006, Pages

A dynamic secure QoS routing protocol for wireless ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; INTELLIGENT AGENTS; NETWORK PROTOCOLS; NETWORK ROUTING; QUALITY OF SERVICE; ROUTING PROTOCOLS; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 50649121289     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SARNOF.2006.4534795     Document Type: Conference Paper
Times cited : (24)

References (17)
  • 1
    • 33646915038 scopus 로고    scopus 로고
    • Cryptography and Network Security: Principles and Practice
    • 3rd Edition
    • W. Stallings, "Cryptography and Network Security: Principles and Practice," Prentice Hall, 3rd Edition, 2003.
    • (2003) Prentice Hall
    • Stallings, W.1
  • 2
    • 0033296115 scopus 로고    scopus 로고
    • Internet Security Architecture
    • April
    • R. Molva, "Internet Security Architecture," Journal of Computer Networks, no. 8, vol. 31, pp. 785-899, April 1999.
    • (1999) Journal of Computer Networks , vol.31 , Issue.8 , pp. 785-899
    • Molva, R.1
  • 7
    • 50649109340 scopus 로고    scopus 로고
    • S. Cheung, An efficient message authentication scheme for link state routing, The 13th Annual Computer Security Applications Conference, pp. 9098, December 1997.
    • S. Cheung, "An efficient message authentication scheme for link state routing," The 13th Annual Computer Security Applications Conference, pp. 9098, December 1997.
  • 9
    • 50649113395 scopus 로고    scopus 로고
    • A Credit-Based Secure Routing Protocol for Wireless Ad Hoc Networks,
    • Technical Report, Dept. of ECE, SUNY Binghamton
    • M. Yu and T. Zhu, "A Credit-Based Secure Routing Protocol for Wireless Ad Hoc Networks," Technical Report, Dept. of ECE, SUNY Binghamton, 2005.
    • (2005)
    • Yu, M.1    Zhu, T.2
  • 10
    • 33847273536 scopus 로고    scopus 로고
    • A New Secure Routing Protocol To Defend Byzantine Attacks For Ad Hoc Networks
    • Kuala Lumpur, Malaysia, Nov. 16-18
    • M. Yu, S. Kulkarni, and P. Lau, "A New Secure Routing Protocol To Defend Byzantine Attacks For Ad Hoc Networks, IEEE Int. Conf. on Networks (ICON), vol. 2, pp. 1126-1131, Nov. 16-18, Kuala Lumpur, Malaysia.
    • IEEE Int. Conf. on Networks (ICON) , vol.2 , pp. 1126-1131
    • Yu, M.1    Kulkarni, S.2    Lau, P.3
  • 11
    • 0003802960 scopus 로고    scopus 로고
    • K. Fall and K. Varadhan Eds
    • K. Fall and K. Varadhan (Eds.), "The ns Manual," http://www.isi.edu/nsnam/ns/ns-documentation.html, 2002.
    • (2002) The ns Manual
  • 12
    • 84890788516 scopus 로고    scopus 로고
    • Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
    • IEEE Computer Society LAN MAN Standards Committee, IEEE
    • IEEE Computer Society LAN MAN Standards Committee. "Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications," IEEE Std 802.11-1997., IEEE, 1997.
    • (1997) IEEE Std 802.11-1997
  • 13
    • 85106319926 scopus 로고    scopus 로고
    • A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
    • J. Broch, D. Maltz, D. Johnson, Y-C. Hu, and J. Jetcheva. "A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols," IEEE/ACM MOBICOM, p. 85-97, 1998.
    • (1998) IEEE/ACM MOBICOM , pp. 85-97
    • Broch, J.1    Maltz, D.2    Johnson, D.3    Hu, Y.-C.4    Jetcheva, J.5
  • 15
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
    • Addison-Wesley
    • D. B. Johnson, D. A. Maltz, and J. Broch, "DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks," Ad Hoc Networking, pp. 139- 172, Addison-Wesley, 2001.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2    Broch, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.