메뉴 건너뛰기




Volumn , Issue , 2008, Pages 2360-2368

A security architecture achieving anonymity and traceability in wireless mesh networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; COMPUTER NETWORKS; LOCAL AREA NETWORKS;

EID: 51349100827     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2007.230     Document Type: Conference Paper
Times cited : (24)

References (40)
  • 4
    • 51349128118 scopus 로고    scopus 로고
    • European Telecommunications Standards Institute (ETSI), GSM 2.09: Security Aspects., June 1993.
    • European Telecommunications Standards Institute (ETSI), "GSM 2.09: Security Aspects.," June 1993.
  • 5
    • 85008044268 scopus 로고    scopus 로고
    • Selfish MAC layer misbehavior in wireless networks
    • Sept
    • P. Kyasanur and N. H. Vaidya, "Selfish MAC layer misbehavior in wireless networks," IEEE Trans. Mobile Computing, vol. 4, no. 5, pp. 502-516, Sept. 2005.
    • (2005) IEEE Trans. Mobile Computing , vol.4 , Issue.5 , pp. 502-516
    • Kyasanur, P.1    Vaidya, N.H.2
  • 6
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Comm. of the ACM, vol. 47, no. 6, pp. 53-57, 2004.
    • (2004) Comm. of the ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 7
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • Nov
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500-528, Nov. 2006.
    • (2006) ACM Trans. Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 8
    • 51349106487 scopus 로고    scopus 로고
    • A Survey on Wireless Security in Mobile Ad Hoc Networks: Challenges and Possible Solutions
    • edited by X. Chen, X. Huang and D.-Z. Du
    • W. Lou and Y. Fang, A Survey on Wireless Security in Mobile Ad Hoc Networks: Challenges and Possible Solutions, edited by X. Chen, X. Huang and D.-Z. Du, Kluwer Academic Publishers/Springer, 2004.
    • (2004) Kluwer Academic Publishers/Springer
    • Lou, W.1    Fang, Y.2
  • 9
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Dec
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Dec. 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 12
    • 33749856769 scopus 로고    scopus 로고
    • ARSA: An attack-resilient security architecture for multihop wireless mesh networks
    • Oct
    • Y. Zhang and Y. Fang, "ARSA: An attack-resilient security architecture for multihop wireless mesh networks," IEEE J. Select. Areas Communications, vol. 24, no. 10, pp. 1916-1928, Oct. 2006.
    • (2006) IEEE J. Select. Areas Communications , vol.24 , Issue.10 , pp. 1916-1928
    • Zhang, Y.1    Fang, Y.2
  • 13
    • 13844296355 scopus 로고    scopus 로고
    • Wireless mesh networks: A survey
    • Mar
    • I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Comput. Netw., vol. 47, no. 4, pp. 445-487, Mar. 2005.
    • (2005) Comput. Netw , vol.47 , Issue.4 , pp. 445-487
    • Akyildiz, I.F.1    Wang, X.2    Wang, W.3
  • 16
    • 0033296116 scopus 로고    scopus 로고
    • Untraceable mobility or how to travel incognito
    • Apr
    • G. Ateniese, A. Herzberg, H. Krawczyk, and G. Tsudik, "Untraceable mobility or how to travel incognito," Comput. Netw., vol. 31, no. 8, pp. 871884, Apr. 1999.
    • (1999) Comput. Netw , vol.31 , Issue.8 , pp. 871884
    • Ateniese, G.1    Herzberg, A.2    Krawczyk, H.3    Tsudik, G.4
  • 17
    • 2542616812 scopus 로고    scopus 로고
    • Quest for personal control over mobile location privacy
    • May
    • Q. He, D. Wu, and P. Khosla, "Quest for personal control over mobile location privacy," IEEE Communications Magazine, vol. 42, no. 5, pp. 130-136, May 2004.
    • (2004) IEEE Communications Magazine , vol.42 , Issue.5 , pp. 130-136
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 18
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. R. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervasive Computing, vol. 2, pp. 46-55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 19
    • 33748622050 scopus 로고    scopus 로고
    • MASK: Anonymous on-demand routing in mobile ad hoc networks
    • Sept
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous on-demand routing in mobile ad hoc networks," IEEE Trans. Wireless Communications, vol. 5, no. 9, pp. 2376-2385, Sept. 2006.
    • (2006) IEEE Trans. Wireless Communications , vol.5 , Issue.9 , pp. 2376-2385
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 24
    • 33751529199 scopus 로고    scopus 로고
    • Securing mobile ad hoc networks with certificateless public keys
    • Oct
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 386-399, Oct. 2006.
    • (2006) IEEE Trans. Dependable and Secure Computing , vol.3 , Issue.4 , pp. 386-399
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 25
    • 84946840347 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairings, Advances in Cryptology-Asiacrypt 2001
    • Springer-Verlag
    • D. Boneh and M. Franklin, Identity-based encryption from the weil pairings, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, pp. 514-532, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Franklin, M.2
  • 26
    • 84958591696 scopus 로고    scopus 로고
    • Security of blind digital signatures, Advances in Cryptology - CRYPTO '97
    • Springer- Verlag
    • A. Juels, M. Luby, and R. Ostrovsky, Security of blind digital signatures, Advances in Cryptology - CRYPTO '97, LNCS 1294, pp. 150-164, Springer- Verlag. 1997.
    • (1997) LNCS , vol.1294 , pp. 150-164
    • Juels, A.1    Luby, M.2    Ostrovsky, R.3
  • 27
    • 0010280770 scopus 로고    scopus 로고
    • An efficient off-line electronic cash system based on the representation problem
    • CS-R9323, 1993
    • S. Brands. An efficient off-line electronic cash system based on the representation problem, CWI Technical Report CS-R9323, 1993.
    • CWI Technical Report
    • Brands, S.1
  • 28
    • 84974652864 scopus 로고    scopus 로고
    • Provably secure partially blind signatures, Advances in Cryptology - Crypto 2000
    • Springer-Verlag
    • M. Abe and T. Okamoto, Provably secure partially blind signatures, Advances in Cryptology - Crypto 2000. LNCS 1880, no. 271-286, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1880 , Issue.271-286
    • Abe, M.1    Okamoto, T.2
  • 29
    • 26444573086 scopus 로고    scopus 로고
    • Two improved partially blind signature schemes from bilinear pairings
    • ACISP, Springer-Verlag
    • S. M. Chow, C. K. Hui, S. M. Yiu, and K. P. Chow. Two improved partially blind signature schemes from bilinear pairings. ACISP 2005, LNCS 3574, pp. 316-328, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3574 , pp. 316-328
    • Chow, S.M.1    Hui, C.K.2    Yiu, S.M.3    Chow, K.P.4
  • 30
    • 84958951205 scopus 로고    scopus 로고
    • A provably secure restrictive partially blind signature scheme
    • Springer-Verlag
    • G. Maitland and C. Boyd, A provably secure restrictive partially blind signature scheme, LNCS 2274, pp. 99-114, Springer-Verlag. 2002.
    • (2002) LNCS , vol.2274 , pp. 99-114
    • Maitland, G.1    Boyd, C.2
  • 32
    • 33846050393 scopus 로고    scopus 로고
    • ID-based restrictive partially blind signatures and applications
    • Feb
    • X. Chen, F. Zhang, and S. Liu, "ID-based restrictive partially blind signatures and applications," Journal of Systems and Software, vol. 80, no. 2, pp. 164-171, Feb. 2007.
    • (2007) Journal of Systems and Software , vol.80 , Issue.2 , pp. 164-171
    • Chen, X.1    Zhang, F.2    Liu, S.3
  • 33
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical id-based cryptography
    • Dec
    • C. Gentry and A. Silverberg, "Hierarchical id-based cryptography," Proc. ASIACRYPT, pp. 548-556, Dec. 2002.
    • (2002) Proc. ASIACRYPT , pp. 548-556
    • Gentry, C.1    Silverberg, A.2
  • 34
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity-based signature schemes based on pairings
    • SAC, Springer-Verlag
    • F. Hess, Efficient identity-based signature schemes based on pairings. SAC 2002, LNCS 2595, pp. 310-324. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2595 , pp. 310-324
    • Hess, F.1
  • 35
    • 51349160979 scopus 로고    scopus 로고
    • R. Dutta, R. Barua, and P. Sarkar. Pairing-based cryptography: a survey, Cryptology ePrint Archive, Report 2004/064, available at http://eprint.iacr.org/2004/064.pdf, 2004.
    • R. Dutta, R. Barua, and P. Sarkar. Pairing-based cryptography: a survey, Cryptology ePrint Archive, Report 2004/064, available at http://eprint.iacr.org/2004/064.pdf, 2004.
  • 38
    • 11244250305 scopus 로고    scopus 로고
    • The effect of rumor spreading in reputation systems for mobile ad-hoc networks
    • Mar
    • S. Buchegger and J. L. Boudec, "The effect of rumor spreading in reputation systems for mobile ad-hoc networks," in Proc. WiOpt'03, Mar. 2003.
    • (2003) Proc. WiOpt'03
    • Buchegger, S.1    Boudec, J.L.2
  • 40
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks
    • 5, Apr
    • 5. Zhong, J. Chen, and Y. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks," IEEE INFOCOM, vol. 3, pp. 1987-1997, Apr. 2003.
    • (2003) IEEE INFOCOM , vol.3 , pp. 1987-1997
    • Zhong, J.C.1    Yang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.