메뉴 건너뛰기




Volumn 16, Issue 2, 2009, Pages 24-29

Securing resource-constrained wireless ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

DESIGN PROBLEMS; FUTURE INTERNET; ID-BASED CRYPTOGRAPHY; INTEGRAL PART; NEW FORMS; PALM PILOT; RESEARCH FRONT; RESOURCE CONSTRAINT; RESOURCE-CONSTRAINED; RESOURCECONSTRAINED DEVICES; SECURITY ISSUES; SECURITY PROBLEMS; SMART PHONES; WIRED AND WIRELESS; WIRELESS SENSOR;

EID: 67349212443     PISSN: 15361284     EISSN: None     Source Type: Journal    
DOI: 10.1109/MWC.2009.4907556     Document Type: Article
Times cited : (26)

References (33)
  • 1
    • 0036688074 scopus 로고    scopus 로고
    • A survey on sensor networks
    • Aug.
    • I. Akyildiz et al., "A Survey on Sensor Networks," IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102-116
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.8 , pp. 102-116
    • Akyildiz, I.1
  • 2
    • 13844296355 scopus 로고    scopus 로고
    • Wireless mesh networks: A survey
    • Mar.
    • Akyildiz, X. Wang, and W. Wang, "Wireless Mesh Networks: A Survey," Comp. Net., Mar. 2005.
    • (2005) Comp. Net.
    • Wang, A.X.1    Wang, W.2
  • 3
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May-June
    • Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Sec. & Privacy, vol. 2, no. 3, May-June 2004, pp. 28-39.
    • (2004) IEEE Sec. & Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu1    Perrig, A.2
  • 4
    • 4143071452 scopus 로고    scopus 로고
    • A survey on wireless security in mobile ad hoc networks: Challenges and possible solutions
    • (Springer Network Theory and Applications Series) X. Chen, X. Huang, and D.-Z. Du, Eds., Kluwer/Springer
    • W. Lou and Y. Fang, "A Survey on Wireless Security in Mobile Ad Hoc Networks: Challenges and Possible Solutions," in Ad Hoc Wireless Networking (Springer Network Theory and Applications Series), vol. 14, X. Chen, X. Huang, and D.-Z. Du, Eds., Kluwer/Springer, 2004.
    • (2004) Ad Hoc Wireless Networking , vol.14
    • Lou, W.1    Fang, Y.2
  • 5
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • Feb.
    • H. Yang et al., "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Commun., vol. 11, no. 1, Feb. 2004, pp. 38-47.
    • (2004) IEEE Wireless Commun. , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1
  • 6
    • 34547545598 scopus 로고    scopus 로고
    • A secure authentication and billing architecture for wireless mesh networks
    • Oct.
    • Y. Zhang and Y. Fang, "A Secure Authentication and Billing Architecture for Wireless Mesh Networks," ACM Wireless Net, vol. 13, no. 5, Oct. 2007, pp. 569-582
    • (2007) ACM Wireless Net , vol.13 , Issue.5 , pp. 569-582
    • Zhang, Y.1    Fang, Y.2
  • 7
    • 33749856769 scopus 로고    scopus 로고
    • ARSA: An attack-resilient security architecture for multihop wireless mesh networks
    • DOI 10.1109/JSAC.2006.877223, 1705622
    • Y. Zhang and Y. Fang, "ARSA: An Attack-Resilient Security Architecture for Multi-Hop Wireless Mesh Networks," IEEE JSAC, vol. 24, no. 10, Oct. 2006, pp. 1916-1928 (Pubitemid 44559604)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.10 , pp. 1916-1928
    • Zhang, Y.1    Fang, Y.2
  • 8
    • 33144476837 scopus 로고    scopus 로고
    • Location-based security mechanisms in wireless sensor networks
    • Feb.
    • Y. Zhang et al., "Location-based Security Mechanisms in Wireless Sensor Networks," IEEE JSAC, vol. 24, no. 2, Feb. 2006, pp. 247-260
    • (2006) IEEE JSAC , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1
  • 9
    • 33748622050 scopus 로고    scopus 로고
    • MASK: Anonymous on-demand routing in mobile Ad Hoc networks
    • DOI 10.1109/TWC.2006.1687761, 1687761
    • Y. Zhang et al., "MASK: Anonymous On- Demand Routing in Mobile Ad Hoc Networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, Sept. 2006, pp. 2376-2385 (Pubitemid 44376150)
    • (2006) IEEE Transactions on Wireless Communications , vol.5 , Issue.9 , pp. 2376-2385
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 10
    • 33751529199 scopus 로고    scopus 로고
    • Securing mobile ad hoc networks with certificateless public keys
    • Oct.-Dec.
    • Y. Zhang et al., "Securing Mobile Ad Hoc Networks with Certificateless Public Keys," IEEE Trans. Dependable Secure Comp., vol. 3, no. 4, Oct.-Dec. 2006, pp. 386-399
    • (2006) IEEE Trans. Dependable Secure Comp. , vol.3 , Issue.4 , pp. 386-399
    • Zhang, Y.1
  • 11
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless Public Key Cryptography
    • Advances in Cryptology - ASIACRYPT 2003
    • S. Al-Riyami and K. Paterson, "Certificateless Public Key Cryptography," Proc. AsiaCrypt ' 03, LNCS 2894, Springer-Verlag, 2003, pp. 452-473 (Pubitemid 37502192)
    • (2003) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2894 , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 12
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • LNCS 196, Springer- Verlag
    • A. Shamir, "Identity Based Cryptosystems and Signature Schemes," Proc. CRYPTO ' 84, LNCS 196, Springer- Verlag, 1984, pp. 47-53.
    • (1984) Proc. CRYPTO '84 , pp. 47-53
    • Shamir, A.1
  • 14
    • 84874324906 scopus 로고    scopus 로고
    • Identify-based encryption from the weil pairing
    • LNCS 2139, Springer-Verlag
    • D. Boneh and M. Franklin, "Identify-based Encryption from the Weil Pairing," Proc. CRYPTO 01, LNCS 2139, Springer-Verlag, 2001, pp. 213-229
    • (2001) Proc. CRYPTO '01 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 15
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • LNCS 2442. Springer-Verlag
    • P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," Proc. CRYPTO 02, LNCS 2442. Springer-Verlag, 2002, pp. 354-368
    • (2002) Proc. CRYPTO '02 , pp. 354-368
    • Barreto, P.1    Kim, H.2    Bynn, B.3    Scott, M.4
  • 16
    • 24644510922 scopus 로고    scopus 로고
    • An identity-based non-interactive authentication framework for computational grids
    • Hewlett- Packard Labs. June
    • W. Mao, "An Identity-Based Non-Interactive Authentication Framework for Computational Grids," Hewlett- Packard Labs. tech. rep. HPL- 2004-2096, June 2004.
    • (2004) Tech. Rep. HPL-2004-2096
    • Mao, W.1
  • 17
    • 67349231049 scopus 로고    scopus 로고
    • Efficient hardware for the tate pairing calculation in characteristic three
    • rep. 2005/065
    • T. Kerins et al., "Efficient Hardware for the Tate Pairing Calculation in Characteristic Three," Cryptology ePrint archive, rep. 2005/065, 2005;
    • (2005) Cryptology EPrint Archive
    • Kerins, T.1
  • 19
    • 35048900981 scopus 로고    scopus 로고
    • On the Selection of Pairing-Friendly Groups
    • Selected Areas in Cryptography
    • P. Barreto, B. Lynn, and M. Scott, "On the Selection of Pairing-Friendly Groups," Sel. Areas Cryptography 2003, LNCS 3006, Springer-Verlag, 2004, pp. 17-25. (Pubitemid 38530728)
    • (2004) LECTURE NOTES IN COMPUTER SCIENCE , Issue.3006 , pp. 17-25
    • Barreto, P.S.L.M.1    Lynn, B.2    Scott, M.3
  • 20
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • Washington, DC, Nov.
    • L. Eschenauer and V. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. ACM CCS, Washington, DC, Nov. 2002.
    • (2002) Proc. ACM CCS
    • Eschenauer, L.1    Gligor, V.2
  • 21
    • 0038487088 scopus 로고    scopus 로고
    • Random key predis- tribution schemes for sensor networks
    • Oakland, CA, May
    • H. Chan, A. Perrig, and D. Song, "Random Key Predis- tribution Schemes for Sensor Networks," IEEE Symp. Sec. & Privacy, Oakland, CA, May 2003.
    • (2003) IEEE Symp. Sec. & Privacy
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 22
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key pre-distribution scheme for wireless sensor networks
    • Washington, DC, Oct.
    • W. Du et al., "A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks," Proc. ACM CCS, Washington, DC, Oct. 2003.
    • (2003) Proc. ACM CCS
    • Du, W.1
  • 23
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Washington, DC, Oct.
    • D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks," Proc. ACM CCS, Washington, DC, Oct. 2003.
    • (2003) Proc. ACM CCS
    • Liu, D.1    Ning, P.2
  • 24
    • 4544293215 scopus 로고    scopus 로고
    • Location-based pairwise key establishments for static sensor networks
    • Fairfax, VA, Oct.
    • D. Liu and P. Ning, "Location-based Pairwise Key Establishments for Static Sensor Networks," Proc. ACM SASN, Fairfax, VA, Oct. 2003.
    • (2003) Proc. ACM SASN
    • Liu, D.1    Ning, P.2
  • 27
    • 0018545449 scopus 로고
    • HOW TO SHARE A SECRET.
    • DOI 10.1145/359168.359176
    • A. Shamir, "How to Share a Secret," Commun. ACM, vol. 22, no. 11, 1979, pp. 612-613 (Pubitemid 10431338)
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir Adi1
  • 28
    • 3042546547 scopus 로고    scopus 로고
    • Threshold and identity-based key management and authentication for wireless ad hoc networks
    • Las Vegas, NV, Apr.
    • H. Deng, A. Mukherjee, and D. Agrawal, "Threshold and Identity-Based Key Management and Authentication for Wireless Ad Hoc Networks," Int'l. Conf. Info. Tech.: Coding Comp. 04, Las Vegas, NV, Apr. 2004.
    • (2004) Int'L. Conf. Info. Tech.: Coding Comp. '04
    • Deng, H.1    Mukherjee, A.2    Agrawal, D.3
  • 29
    • 7744225358 scopus 로고    scopus 로고
    • Efficient identity-based security schemes for ad hoc network routing protocols
    • M. Bohio and A. Miri, "Efficient Identity-Based Security Schemes for Ad Hoc Network Routing Protocols," Elsevier Ad Hoc Net. J, vol. 2, no. 3, 2004, pp. 309-317
    • (2004) Elsevier Ad Hoc Net. J , vol.2 , Issue.3 , pp. 309-317
    • Bohio, M.1    Miri, A.2
  • 31
    • 51349100827 scopus 로고    scopus 로고
    • A security architecture achieving anonymity and traceability in wireless mesh networks
    • Phoenix, AZ, Apr.
    • J. Sun, C. Zhang, and Y. Fang, "A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," Proc. 27th IEEE INFOCOM 08, Phoenix, AZ, Apr. 13-18 2008.
    • (2008) Proc. 27th IEEE INFOCOM '08 , pp. 13-18
    • Sun, J.1    Zhang, C.2    Fang, Y.3
  • 32
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Ad Hoc Net., vol. 1, no. 2, 2003.
    • (2003) Ad Hoc Net. , vol.1 , Issue.2
    • Karlof, C.1    Wagner, D.2
  • 33
    • 11244326497 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: Analysis & defenses
    • Berkeley, CA, Apr.
    • J. Newsome et al., "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proc. 3rd IPSN ' 04, Berkeley, CA, Apr. 2004.
    • (2004) Proc. 3rd IPSN '04
    • Newsome, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.