메뉴 건너뛰기




Volumn 1, Issue 1, 2003, Pages 193-209

Secure message transmission in mobile ad hoc networks

Author keywords

MANET security; Multipath routing; Secure message transmission; Secure routing; Secure routing protocol

Indexed keywords

DATA COMMUNICATION SYSTEMS; NETWORK PROTOCOLS; QUALITY OF SERVICE; ROUTERS; TELECOMMUNICATION NETWORKS; TELECOMMUNICATION TRAFFIC;

EID: 6344273537     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1570-8705(03)00018-0     Document Type: Article
Times cited : (121)

References (28)
  • 2
    • 0003899978 scopus 로고    scopus 로고
    • The secure routing protocol (SRP) for ad hoc networks
    • draft-papadimitratos-secure-routing-protocol-00.txt, December
    • P. Papadimitratos, Z.J. Haas, P. Samar, The secure routing protocol (SRP) for ad hoc networks, Internet Draft, draft-papadimitratos-secure-routing- protocol-00.txt, December 2002.
    • (2002) Internet Draft
    • Papadimitratos, P.1    Haas, Z.J.2    Samar, P.3
  • 3
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • M.O. Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance, J. ACM 36 (2) (1989) 335-348.
    • (1989) J. ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 4
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyedhashing for message authentication
    • February
    • H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyedhashing for message authentication, RFC 2104, February 1997.
    • (1997) RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 6
    • 0035507501 scopus 로고    scopus 로고
    • Multipath routing in the presence of frequent topological changes
    • A. Tsirigos, Z.J. Haas, Multipath routing in the presence of frequent topological changes, IEEE Comm. Mag. (November) (2001) 132-138.
    • (2001) IEEE Comm. Mag. , Issue.NOVEMBER , pp. 132-138
    • Tsirigos, A.1    Haas, Z.J.2
  • 8
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the Internet protocol
    • November
    • S. Kent, R. Atkinson, Security architecture for the Internet protocol, IETF RFC 2401, November 1998.
    • (1998) IETF RFC , vol.2401
    • Kent, S.1    Atkinson, R.2
  • 9
    • 0003254362 scopus 로고    scopus 로고
    • IP authentication header
    • November
    • S. Kent, R. Atkinson, IP authentication header, IETF FC 2402, November 1998.
    • (1998) IETF FC , vol.2402
    • Kent, S.1    Atkinson, R.2
  • 10
    • 0003315822 scopus 로고    scopus 로고
    • IP Encapsulating security payload
    • November
    • S. Kent, R. Atkinson, IP Encapsulating security payload, IETF FC 2406, November 1998.
    • (1998) IETF FC , vol.2406
    • Kent, S.1    Atkinson, R.2
  • 11
    • 0003357112 scopus 로고    scopus 로고
    • Internet security association and key management protocol
    • November
    • D. Maughan, M. Schertler, M. Schneider, J. Turner, Internet security association and key management protocol, IETF RFC 2408, November 1998.
    • (1998) IETF RFC , vol.2408
    • Maughan, D.1    Schertler, M.2    Schneider, M.3    Turner, J.4
  • 13
    • 0003324496 scopus 로고    scopus 로고
    • Stream control transmission protocol
    • October
    • R. Stewart et al., Stream control transmission protocol, IETF RFC 2960, October 2000.
    • (2000) IETF RFC , vol.2960
    • Stewart, R.1
  • 14
    • 0031352149 scopus 로고    scopus 로고
    • TCP-Boston: A fragmentationtolerant TCP protocol for ATM networks
    • Kobe, Japan, April
    • A. Bestavros, G. Kim, TCP-Boston: A fragmentationtolerant TCP protocol for ATM networks, in: Proceedings of the IEEE Infocom'97, Kobe, Japan, April 1997.
    • (1997) Proceedings of the IEEE Infocom'97
    • Bestavros, A.1    Kim, G.2
  • 16
    • 84954161437 scopus 로고    scopus 로고
    • Enforcing service availability in mobile ad hoc WANs
    • Boston, MA, August
    • L. Buttyan, J.P. Hubaux, Enforcing service availability in mobile ad hoc WANs, in: Proceedings of the 1st MobiHoc, Boston, MA, August 2000.
    • (2000) Proceedings of the 1st MobiHoc
    • Buttyan, L.1    Hubaux, J.P.2
  • 18
    • 0001262977 scopus 로고
    • Probabilistic algorithms in finite fields
    • M.O. Rabin, Probabilistic algorithms in finite fields, SIAM J. Comput. 9 (1980).
    • (1980) SIAM J. Comput. , vol.9
    • Rabin, M.O.1
  • 19
    • 0344095743 scopus 로고    scopus 로고
    • Using elliptic curve Diffie-Hellman in the SPKM GSS-API
    • August
    • R. Zucceratto, C. Adams, Using elliptic curve Diffie-Hellman in the SPKM GSS-API, IETF Internet Draft, August 1999.
    • (1999) IETF Internet Draft
    • Zucceratto, R.1    Adams, C.2
  • 25
    • 0004118143 scopus 로고    scopus 로고
    • A secure routing protocol for ad hoc networks
    • EE&CS, University of Michigan, August
    • B. Dahill, B.N. Levine, E. Royer, C. Shields, A secure routing protocol for ad hoc networks, Technical Report UM-CS-2001-037, EE&CS, University of Michigan, August 2001.
    • (2001) Technical Report , vol.UM-CS-2001-037
    • Dahill, B.1    Levine, B.N.2    Royer, E.3    Shields, C.4
  • 28


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.