메뉴 건너뛰기




Volumn , Issue , 2008, Pages

ALPHA: An adaptive and lightweight protocol for hop-by-hop authentication

Author keywords

Authentication; Hash chains; Integrity protection

Indexed keywords

HASH CHAINS; HOP BY HOP; INTEGRITY PROTECTION; LIGHTWEIGHT PROTOCOLS; MIDDLEBOXES; MULTIHOP NETWORKS; NETWORK TRAFFIC; RELIABLE COMMUNICATION; RESOURCE CONSTRAINT; SECURITY MECHANISM; SMARTPHONES; UNICAST TRAFFIC; WIRELESS MULTI-HOP NETWORK;

EID: 70350755765     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1544012.1544035     Document Type: Conference Paper
Times cited : (31)

References (26)
  • 1
    • 70350772766 scopus 로고    scopus 로고
    • HEAP: Hop-by-hop efficient authentication protocol For mobile ad-hoc networks
    • AKBANI, R., KORKMAZ, T., AND RAJU, G. HEAP: Hop-by-hop Efficient Authentication Protocol For Mobile Ad-hoc Networks. CNS 07 (2007).
    • (2007) CNS 07
    • Akbani, R.1    Korkmaz, T.2    Raju, G.3
  • 3
    • 0002757750 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • BELLARE, M., CANETTI, R., AND KRAWCZYK, H. Keying hash functions for message authentication. CRYPTO 96 (1996).
    • (1996) CRYPTO 96
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 8
    • 0030645662 scopus 로고    scopus 로고
    • Reducing the cost of security in link state routing
    • HAUSER, R., PRZYGIENDA, A., AND TSUDIK, G. Reducing the Cost of Security in Link State Routing. NDSS '97 (1997).
    • (1997) NDSS '97
    • Hauser, R.1    Przygienda, A.2    Tsudik, G.3
  • 9
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • HU, Y.-C., PERRIG, A., AND JOHNSON, D. Packet leashes: a defense against wormhole attacks in wireless networks. INFOCOM (2003).
    • (2003) INFOCOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.3
  • 10
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • LAMPORT, L. Password authentication with insecure communication. Commun. ACM, 11 (1981).
    • (1981) Commun. ACM , pp. 11
    • Lamport, L.1
  • 11
    • 33749513007 scopus 로고    scopus 로고
    • Practical broadcast authentication in sensor networks
    • LIU, D., NING, P., ZHU, S., AND JAJODIA, S. Practical broadcast authentication in sensor networks. MobiQuitous (2005).
    • (2005) MobiQuitous
    • Liu, D.1    Ning, P.2    Zhu, S.3    Jajodia, S.4
  • 12
    • 70350750156 scopus 로고    scopus 로고
    • A light-weight hop-by-hop authentication protocol for mobile ad hoc networks
    • LU, B., AND POOCH, U. W. A Light-weight Hop-by-hop Authentication Protocol for Mobile Ad Hoc Networks. International Journal of Information Technology 11, 2 (2005).
    • (2005) International Journal of Information Technology , vol.11 , pp. 2
    • Lu, B.1    Pooch, U.W.2
  • 13
    • 34748887238 scopus 로고
    • Generating strong one-way functions with cryptographic algorithm
    • MATYAS, S., MEYER, C., AND OSEAS, J. Generating strong one-way functions with cryptographic algorithm. IBM Technical Disclosure Bulletin 27, 10A (1985).
    • (1985) IBM Technical Disclosure Bulletin , vol.27
    • Matyas, S.1    Meyer, C.2    Oseas, J.3
  • 14
    • 0002586876 scopus 로고
    • A digital signature based on a conventional encryption function
    • MERKLE, R. C. A digital signature based on a conventional encryption function. In CRYPTO '87 (1988).
    • (1988) CRYPTO '87
    • Merkle, R.C.1
  • 15
    • 0001263548 scopus 로고
    • A certified digital signature
    • MERKLE, R. C. A certified digital signature. In CRYPTO '89 (1990).
    • (1990) CRYPTO '89
    • Merkle, R.C.1
  • 17
    • 15744368857 scopus 로고    scopus 로고
    • Efficient and secure source authentication for multicast
    • PERRIG, A., CANETTI, R., SONG, D., AND TYGAR, J. Efficient and Secure Source Authentication for Multicast. NDSS '01 (2001).
    • (2001) NDSS '01
    • Perrig, A.1    Canetti, R.2    Song, D.3    Tygar, J.4
  • 20
    • 24144433244 scopus 로고    scopus 로고
    • Zero common-knowledge authentication for pervasive networks
    • WEIMERSKIRCH, A., AND WESTHOFF, D. Zero Common-Knowledge Authentication for Pervasive Networks. SAC '03 (2003).
    • (2003) SAC '03
    • Weimerskirch, A.1    Westhoff, D.2
  • 21
    • 70350748015 scopus 로고    scopus 로고
    • Reliable broadcast message authentication in wireless sensor networks
    • YAO, T., FUKUNAGA, S., AND NAKAI, T. Reliable broadcast message authentication in wireless sensor networks. In EUC Workshops (2006).
    • (2006) EUC Workshops
    • Yao, T.1    Fukunaga, S.2    Nakai, T.3
  • 23
    • 85180543368 scopus 로고    scopus 로고
    • Efficient protocols for signing routing messages
    • ZHANG, K. Efficient protocols for signing routing messages. NDSS '98 (1998).
    • (1998) NDSS '98
    • Zhang, K.1
  • 24
    • 51349136300 scopus 로고    scopus 로고
    • Lightweight and compromise-resilient message authentication in sensor networks
    • ZHANG, W., SUBRAMANIAN, N., AND WANG, G. Lightweight and compromise-resilient message authentication in sensor networks. INFOCOM 2008 (2008).
    • (2008) INFOCOM 2008
    • Zhang, W.1    Subramanian, N.2    Wang, G.3
  • 25
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • ZHU, S., SETIA, S., JAJODIA, S., AND NING, P. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. Security and Privacy (2004).
    • (2004) Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.