메뉴 건너뛰기




Volumn 53, Issue 12, 2009, Pages 2192-2207

Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks

Author keywords

Authentication; Experimental testbed; Security; Wireless mesh networks

Indexed keywords

ACCESS NETWORK; CENTRAL SERVERS; DATA CONFIDENTIALITY; EFFECTIVE SOLUTION; EXPERIMENTAL TESTBED; EXTENSIVE SIMULATIONS; IEEE802.11I; KEY DISTRIBUTION SCHEMES; KEY FEATURE; LARGE-SCALE NETWORK; MESH NETWORK; MESH ROUTERS; NETWORK ACCESS; NETWORK NODE; NETWORK SIMULATORS; NUMERICAL RESULTS; PROPOSED ARCHITECTURES; SEAMLESS MOBILITY; SECURITY; SECURITY ARCHITECTURE; WIRELESS BACKBONE; WIRELESS CLIENT; WIRELESS MESH NETWORKING; WIRELESS NETWORKING; WIRELESS TECHNOLOGIES;

EID: 67549118440     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2009.04.002     Document Type: Article
Times cited : (22)

References (43)
  • 1
    • 13844296355 scopus 로고    scopus 로고
    • Wireless mesh networks: a survey
    • Akyildiz I.F., Wang X., and Wang W. Wireless mesh networks: a survey. Computer Networks 47 4 (2005) 445-487
    • (2005) Computer Networks , vol.47 , Issue.4 , pp. 445-487
    • Akyildiz, I.F.1    Wang, X.2    Wang, W.3
  • 2
    • 17744372294 scopus 로고    scopus 로고
    • Mesh networks: commodity multihop ad hoc networks
    • Bruno R., Conti M., and Gregori E. Mesh networks: commodity multihop ad hoc networks. IEEE Communications Magazine 43 3 (2005) 123-131
    • (2005) IEEE Communications Magazine , vol.43 , Issue.3 , pp. 123-131
    • Bruno, R.1    Conti, M.2    Gregori, E.3
  • 8
    • 33845889547 scopus 로고    scopus 로고
    • Detecting unauthorized and compromised nodes in mobile ad hoc networks
    • Komninos N., Vergados D., and Douligeris C. Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks 5 3 (2007) 289-298
    • (2007) Ad Hoc Networks , vol.5 , Issue.3 , pp. 289-298
    • Komninos, N.1    Vergados, D.2    Douligeris, C.3
  • 9
    • 84883869163 scopus 로고    scopus 로고
    • H. Luo, P. Zerfos, J. Kong, S. Lu, L. Zhang, Self-securing ad hoc wireless networks, in: ISCC 2002: Proceedings of the Seventh International Symposium on Computers and Communications, July 2002, pp. 567-574.
    • H. Luo, P. Zerfos, J. Kong, S. Lu, L. Zhang, Self-securing ad hoc wireless networks, in: ISCC 2002: Proceedings of the Seventh International Symposium on Computers and Communications, July 2002, pp. 567-574.
  • 11
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L., and Haas Z.J. Securing ad hoc networks. IEEE Network 13 6 (1999) 24-30
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 13
    • 67549149933 scopus 로고    scopus 로고
    • R. Fantacci, L. Maccari, T. Pecorella, F. Frosali, A secure and performant token-based authentication for infrastructure and mesh 802.1X networks, in: Infocom'06 Poster Session, April 2006.
    • R. Fantacci, L. Maccari, T. Pecorella, F. Frosali, A secure and performant token-based authentication for infrastructure and mesh 802.1X networks, in: Infocom'06 Poster Session, April 2006.
  • 14
    • 67549111306 scopus 로고    scopus 로고
    • IEEE Standard 802.11i, Medium Access Control (MAC) Security Enhancements, Amendment 6, IEEE Computer Society, 2004.
    • IEEE Standard 802.11i, Medium Access Control (MAC) Security Enhancements, Amendment 6, IEEE Computer Society, 2004.
  • 17
    • 67549121880 scopus 로고    scopus 로고
    • IEEE Standard 802.1X, Port-based Network Access Control, IEEE Computer Society, 2004.
    • IEEE Standard 802.1X, Port-based Network Access Control, IEEE Computer Society, 2004.
  • 18
    • 0013046241 scopus 로고    scopus 로고
    • An initial security analysis of the IEEE 802.1X standard, UM Computer Science Department
    • Technical Report CS-TR-4328, February
    • A. Mishra, W.A. Arbaugh, An initial security analysis of the IEEE 802.1X standard, UM Computer Science Department, Technical Report CS-TR-4328, February 2002.
    • (2002)
    • Mishra, A.1    Arbaugh, W.A.2
  • 21
    • 33749856769 scopus 로고    scopus 로고
    • Arsa: an attack-resilient security architecture for multihop wireless mesh networks
    • Zhang Y., and Fang Y. Arsa: an attack-resilient security architecture for multihop wireless mesh networks. IEEE Journal on Selected Areas in Communications 24 10 (2006) 1916-1928
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.10 , pp. 1916-1928
    • Zhang, Y.1    Fang, Y.2
  • 22
    • 51249085179 scopus 로고    scopus 로고
    • Y. Fu, J. He, R. Wang, G. Li, Mutual authentication in wireless mesh networks, in: ICC'08: Proceedings of the International Conference on Communications, May 2008, pp. 690-1694.
    • Y. Fu, J. He, R. Wang, G. Li, Mutual authentication in wireless mesh networks, in: ICC'08: Proceedings of the International Conference on Communications, May 2008, pp. 690-1694.
  • 26
    • 84904904836 scopus 로고    scopus 로고
    • K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer, A secure routing protocol for ad hoc networks, in: Proceedings of the 10th IEEE International Conference on Network Protocols, November 2002, pp. 78-87.
    • K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer, A secure routing protocol for ad hoc networks, in: Proceedings of the 10th IEEE International Conference on Network Protocols, November 2002, pp. 78-87.
  • 27
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: a secure on-demand routing protocol for ad hoc networks
    • Hu Y.-C., Perrig A., and Johnson D.B. Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless Networks 11 1-2 (2005) 21-38
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 31
    • 67549090649 scopus 로고    scopus 로고
    • T. Dierks, C. Allen, The TLS Protocol Version 1.0, RFC 2246, January 1999
    • T. Dierks, C. Allen, The TLS Protocol Version 1.0, RFC 2246, January 1999.
  • 34
    • 4043060141 scopus 로고    scopus 로고
    • New remote user authentication scheme using smart cards
    • Kumar M. New remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50 2 (2004) 597-600
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 597-600
    • Kumar, M.1
  • 37
    • 67549149456 scopus 로고    scopus 로고
    • Openswan Project
    • Openswan Project, .
  • 38
  • 41
    • 67249131880 scopus 로고    scopus 로고
    • Multi-protocol and multi-platform traffic generation and measurement
    • May
    • A. Botta, A. Dainotti, A. Pescapé, Multi-protocol and multi-platform traffic generation and measurement, in: Infocom'07 DEMO Session, vol. 45, May 2007, pp. 526-532.
    • (2007) Infocom'07 DEMO Session , vol.45 , pp. 526-532
    • Botta, A.1    Dainotti, A.2    Pescapé, A.3
  • 42
    • 67549124042 scopus 로고    scopus 로고
    • Olsrd Project
    • Olsrd Project, .
  • 43
    • 67549117870 scopus 로고    scopus 로고
    • Francisco J. Ros, Um-OLSR Project, 2005, .
    • Francisco J. Ros, Um-OLSR Project, 2005, .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.