메뉴 건너뛰기




Volumn 13, Issue 7, 2009, Pages 457-469

Robust and secure routing scheme for wireless multihop network

Author keywords

Ad hoc security; AODV; Mobile ad hoc network; Multipath routing

Indexed keywords

AD HOC SECURITY; AODV; ATTRACTIVE SOLUTIONS; COMMERCIAL GROWTH; COMMUNICATION FAILURE; LOAD-BALANCING; MULTI-PATH; MULTIPATH ROUTING; MULTIPATH ROUTING PROTOCOLS; ON-DEMAND ROUTING PROTOCOL; PERFORMANCE METRICS; RESEARCH EFFORTS; SECURE ROUTING; SECURITY ANALYSIS; SECURITY ATTACKS; SECURITY SCHEME; SINGLE PATH; TOPOLOGICAL CHANGES; WIRELESS MULTI-HOP NETWORK;

EID: 69949188858     PISSN: 16174909     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00779-009-0220-0     Document Type: Conference Paper
Times cited : (21)

References (30)
  • 5
    • 33751167188 scopus 로고    scopus 로고
    • Ad hoc on-demand multipath distance vector routing
    • Marina MK, Das SR (2006) Ad hoc on-demand multipath distance vector routing. Wiley Wireless Commun Mobile Comput 6(7):969-988
    • (2006) Wiley Wireless Commun Mobile Comput , vol.6 , Issue.7 , pp. 969-988
    • Marina, M.K.1    Das, S.R.2
  • 6
    • 7744233199 scopus 로고    scopus 로고
    • A routing framework for providing robustness to node failures in mobile ad hoc networks
    • Ye Z, Krishnamurthy SV, Tripathi SK (2004) A routing framework for providing robustness to node failures in mobile ad hoc networks. Elsevier Ad Hoc Netw J 2(1):87-107
    • (2004) Elsevier Ad Hoc Netw J , vol.2 , Issue.1 , pp. 87-107
    • Ye, Z.1    Krishnamurthy, S.V.2    Tripathi, S.K.3
  • 15
    • 33751409131 scopus 로고    scopus 로고
    • SMORT: Scalable multipath on-demand routing for mobile ad hoc networks
    • Reddy LR, Raghavan SV (2007) SMORT: Scalable multipath on-demand routing for mobile ad hoc networks. Elsevier Ad hoc Netw J 5(2):162-188
    • (2007) Elsevier Ad Hoc Netw J , vol.5 , Issue.2 , pp. 162-188
    • Reddy, L.R.1    Raghavan, S.V.2
  • 18
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L, Haas ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24-30
    • (1999) IEEE Netw , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 19
    • 0028462933 scopus 로고
    • Threshold cryptography
    • Desmedt YG (1994) Threshold cryptography. Eur Trans Telecommun 5(4):449-457
    • (1994) Eur Trans Telecommun , vol.5 , Issue.4 , pp. 449-457
    • Desmedt, Y.G.1
  • 21
    • 34249327769 scopus 로고    scopus 로고
    • Non-interactive key establishment in mobile ad hoc networks
    • Li Z, Garcia-Luna-Aceves JJ (2007) Non-interactive key establishment in mobile ad hoc networks. Elsevier Ad Hoc Netw J 5(7):1194-1203
    • (2007) Elsevier Ad Hoc Netw J , vol.5 , Issue.7 , pp. 1194-1203
    • Li, Z.1    Garcia-Luna-Aceves, J.J.2
  • 22
    • 49949107235 scopus 로고    scopus 로고
    • Load-balanced key establishment methodologies in wireless sensor networks
    • Araz O, Qi H (2006) Load-balanced key establishment methodologies in wireless sensor networks. Int J Secur Netw 1(3-4):158-166
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 158-166
    • Araz, O.1    Qi, H.2
  • 25
    • 13244276488 scopus 로고    scopus 로고
    • Secure routing in mobile wireless ad hoc networks
    • Gupte S, Singhal M (2003) Secure routing in mobile wireless ad hoc networks. Elsevier Ad Hoc Netw J 1(1):151-174
    • (2003) Elsevier Ad Hoc Netw J , vol.1 , Issue.1 , pp. 151-174
    • Gupte, S.1    Singhal, M.2
  • 28
    • 34547542028 scopus 로고    scopus 로고
    • A survey of current architectures for connecting wireless mobile ad hoc networks to the Internet
    • Ammari HM (2007) A survey of current architectures for connecting wireless mobile ad hoc networks to the Internet. Wiley Int J Commun Syst 20(8):943-968
    • (2007) Wiley Int J Commun Syst , vol.20 , Issue.8 , pp. 943-968
    • Ammari, H.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.