메뉴 건너뛰기




Volumn , Issue , 2008, Pages 482-486

A survey of secure routing in ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; INFORMATION MANAGEMENT; INFORMATION SCIENCE; INTERNET PROTOCOLS; MANAGEMENT INFORMATION SYSTEMS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; NETWORK ROUTING; ROUTING PROTOCOLS; SYSTEMS ENGINEERING; TELECOMMUNICATION; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 51849134597     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WAIM.2008.79     Document Type: Conference Paper
Times cited : (25)

References (32)
  • 3
    • 85177502261 scopus 로고    scopus 로고
    • Yongguang Zhang And Wenke Lee, Intrusion Detection in Wireless Ad-Hoc Networks, MOBICOM, 2000, pp. 275-283
    • Yongguang Zhang And Wenke Lee, Intrusion Detection in Wireless Ad-Hoc Networks, MOBICOM, 2000, pp. 275-283
  • 4
    • 84949958302 scopus 로고    scopus 로고
    • Distributed Light-Weight Authentication Model for Ad-hoc Networks
    • André Weimerskirch and Gilles Thonet, Distributed Light-Weight Authentication Model for Ad-hoc Networks, Lecture Notes In Computer Science; Vol. 2288, pp. 341-354, 2001
    • (2001) Lecture Notes In Computer Science , vol.2288 , pp. 341-354
    • Weimerskirch, A.1    Thonet, G.2
  • 5
    • 0742294233 scopus 로고    scopus 로고
    • Mobile Ad Hoc Networking: Imperatives and Challenges
    • I. Chlamtac, M. Conti, and J. Liu, Mobile Ad Hoc Networking: Imperatives and Challenges, Ad Hoc Networks, vol. 1, pp. 13-64, no. 1, 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 13-64
    • Chlamtac, I.1    Conti, M.2    Liu, J.3
  • 7
    • 84860703392 scopus 로고    scopus 로고
    • Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks, AusCERT2006 R & D Stream Program
    • Australia
    • Ejaz Ahmed, Kashan Samad, Waqar Mahmood, Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks, AusCERT2006 R & D Stream Program, Information Technology Security Conference, May 2006, Australia.
    • (2006) Information Technology Security Conference, May
    • Ahmed, E.1    Samad, K.2    Mahmood, W.3
  • 10
    • 51849169012 scopus 로고    scopus 로고
    • Routing Security in Ad Hoc Networks
    • J. Lundberg, Routing Security in Ad Hoc Networks, 2000. Availabe: http://citeseer.nj.nec.com/400961.html.
    • (2000) Availabe
    • Lundberg, J.1
  • 11
    • 1842815887 scopus 로고    scopus 로고
    • HAO YANG, HAIYUN LUO, FAN YE, SONGWU LU and AND LIXIA ZHANG, Security in mobile ad hoc networks: Challenges and solutions, IEEE Wireless Communications, 11, pp. 38-47, Feb., 2004.
    • HAO YANG, HAIYUN LUO, FAN YE, SONGWU LU and AND LIXIA ZHANG, Security in mobile ad hoc networks: Challenges and solutions, IEEE Wireless Communications, vol. 11, pp. 38-47, Feb., 2004.
  • 12
    • 6344239815 scopus 로고    scopus 로고
    • Real-time Intrusion Detection for Ad hoc Networks
    • M. Sci. dissertation, University of Dublin
    • Ioanna Stamouli, "Real-time Intrusion Detection for Ad hoc Networks", M. Sci. dissertation, University of Dublin, 2003
    • (2003)
    • Stamouli, I.1
  • 13
    • 0001831930 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks
    • Cambridge, UK, April
    • F. Stajano, and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks," Proc. 7th Int'1. Workshop on Security Protocols, Cambridge, UK, April 1999, pp. 172-194.
    • (1999) Proc. 7th Int'1. Workshop on Security Protocols , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 17
    • 0036805086 scopus 로고    scopus 로고
    • Securing the Internet Routing Infrastructure
    • October
    • P. Papadimitratos, and Z.J. Haas, "Securing the Internet Routing Infrastructure," IEEE Communications, vol. 10, no. 40, October 2002, pp. 60-68.
    • (2002) IEEE Communications , vol.10 , Issue.40 , pp. 60-68
    • Papadimitratos, P.1    Haas, Z.J.2
  • 21
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad hoc Networks
    • November/December
    • L. Zhou, and Z.J. Haas, "Securing Ad hoc Networks," IEEE Network Magazine, vol. 6, no. 13, November/December 1999, pp. 24-30.
    • (1999) IEEE Network Magazine , vol.6 , Issue.13 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 25
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
    • Hu, Yih-Chun, Adrian Perrig, and Dave Johnson. "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks." In Wireless Networks Journal, 11(1), 2005.
    • (2005) In Wireless Networks Journal , vol.11 , Issue.1
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.3
  • 26
    • 51849131519 scopus 로고    scopus 로고
    • A. Perrig, R. Canetti, D. Song and J.D. Tygar, Efficient and secure source authentication for multicast, in: Proceedings of the Network and Distributed System Security Symposium, NDSS'01 (February 2001) pp. 35-46.
    • A. Perrig, R. Canetti, D. Song and J.D. Tygar, Efficient and secure source authentication for multicast, in: Proceedings of the Network and Distributed System Security Symposium, NDSS'01 (February 2001) pp. 35-46.
  • 28
    • 6344273537 scopus 로고    scopus 로고
    • Secure Message Transmission in Mobile Ad Hoc Networks
    • Elsevier
    • P. Papadimitratos and Z.J. Haas, "Secure Message Transmission in Mobile Ad Hoc Networks," Elsevier Ad Hoc Networks J., Elsevier, vol. 1, no. 1, 2003, pp. 193-209.
    • (2003) Elsevier Ad Hoc Networks J , vol.1 , Issue.1 , pp. 193-209
    • Papadimitratos, P.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.