메뉴 건너뛰기




Volumn 70, Issue 3, 2010, Pages 309-316

Enhancing data security in ad hoc networks based on multipath routing

Author keywords

Ad hoc networks; Confidentiality; Multipath routing; Security

Indexed keywords

ARBITRARY TOPOLOGY; CONFIDENTIALITY; DATA SECURITY; HARD TASK; MOBILE NODES; MULTI PATH ROUTING; MULTI-PATH; MULTIPLE-PATH; PERFORMANCE EVALUATION; SECURE ROUTING; SECURITY ATTACKS; SECURITY SOLUTIONS; SELF-ORGANIZING NETWORK; WIRELESS LINK;

EID: 74449090010     PISSN: 07437315     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jpdc.2009.02.010     Document Type: Article
Times cited : (39)

References (26)
  • 2
    • 0034317075 scopus 로고    scopus 로고
    • Key Agreement in ad hoc Networks
    • Asokan N., and Ginzboorg P. Key Agreement in ad hoc Networks. Computer Communications 23 17 (2000) 1627-1637
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 7
    • 0036684150 scopus 로고    scopus 로고
    • PKI: It's not dead, just resting
    • Gutmann P. PKI: It's not dead, just resting. IEEE Computer August (2002) 41-49
    • (2002) IEEE Computer , Issue.August , pp. 41-49
    • Gutmann, P.1
  • 8
    • 74449086643 scopus 로고    scopus 로고
    • http://www.cert.org/tech_tips/denial_of_service.html
  • 9
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • Hu Y.-C., and Perring A. A survey of secure wireless ad hoc routing. IEEE Security and Privacy 2 3 (2004)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3
    • Hu, Y.-C.1    Perring, A.2
  • 10
    • 74449093784 scopus 로고    scopus 로고
    • Requirements of ad hoc network protocols, Technical report, Electrical Engineering, Helsinki University of Technology
    • May
    • M.M. Lehmus, Requirements of ad hoc network protocols, Technical report, Electrical Engineering, Helsinki University of Technology, May 2000
    • (2000)
    • Lehmus, M.M.1
  • 11
    • 74949088648 scopus 로고    scopus 로고
    • A secure efficient ad hoc on demand routing protocol for wireless networks
    • SEAR:, Computer and Communication Security, ASIACCS 2008
    • Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe, SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks, in: ACM Symposium on Information, Computer and Communication Security, ASIACCS 2008
    • ACM Symposium on Information
    • Li, Q.1    Hu, Y.-C.2    Zhao, M.3    Perrig, A.4    Walker, J.5    Trappe, W.6
  • 13
    • 4143085056 scopus 로고    scopus 로고
    • Cross-layer design for energy-efficient secure multicast communications in ad hoc networks
    • Paris, France, May
    • L. Loukas, R. Poovendran, Cross-layer design for energy-efficient secure multicast communications in ad hoc networks, in: Proc of IEEE ICC 2004, Paris, France, May 2004
    • (2004) Proc of IEEE ICC
    • Loukas, L.1    Poovendran, R.2
  • 14
    • 4444237581 scopus 로고    scopus 로고
    • Enhancing Data Confidentiality in mobile Ad hoc networks
    • SPREAD:, Hong Kong, China, March
    • W. Lou, W. Liu, Y. Fang, SPREAD: Enhancing Data Confidentiality in mobile Ad hoc networks, in: Proc IEEE INFOCOM, Hong Kong, China, March 2004
    • (2004) Proc IEEE INFOCOM
    • Lou, W.1    Liu, W.2    Fang, Y.3
  • 16
    • 74449091498 scopus 로고    scopus 로고
    • P. Papadimitratos, Z.J. Haas, Secure routing for mobile ad hoc networks, in: SCS Comm. Networks and Distributed Systems Modeling and Simulation, CNDS 2002, San Antonio, TX, Jan. 27-31, 2002
    • P. Papadimitratos, Z.J. Haas, Secure routing for mobile ad hoc networks, in: SCS Comm. Networks and Distributed Systems Modeling and Simulation, CNDS 2002, San Antonio, TX, Jan. 27-31, 2002
  • 18
    • 74449090985 scopus 로고    scopus 로고
    • M.R. Pearlman, Z.J. Haas, P. Sholander, S.S. Tabrizi, On the impact of alternate path routing for load balancing in mobile ad hoc networks, MobiHOC, 2000
    • M.R. Pearlman, Z.J. Haas, P. Sholander, S.S. Tabrizi, On the impact of alternate path routing for load balancing in mobile ad hoc networks, MobiHOC, 2000
  • 19
    • 74449090378 scopus 로고    scopus 로고
    • A. Qayyum, Analysis and evaluation of channel access schemes and routing protocols for wireless networks, Ph.D. Dep Computer Science, Paris XI. Paris Sud University, Nov 2000
    • A. Qayyum, Analysis and evaluation of channel access schemes and routing protocols for wireless networks, Ph.D. Dep Computer Science, Paris XI. Paris Sud University, Nov 2000
  • 20
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing and fault tolerance
    • Rabin M.O. Efficient dispersal of information for security, load balancing and fault tolerance. Journal of the ACM 36 2 (1989) 335-348
    • (1989) Journal of the ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 21
    • 84947912552 scopus 로고    scopus 로고
    • All-or-Nothing Encryption and the package Transform
    • Hafia, Israel
    • Rivest R.L. All-or-Nothing Encryption and the package Transform. Fast Software Encryption Workshop vol. 1267 (1997), Hafia, Israel 210
    • (1997) Fast Software Encryption Workshop , vol.1267 , pp. 210
    • Rivest, R.L.1
  • 22
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Communications of the ACM 22 11 (1979) 612-613
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 24
    • 84949953635 scopus 로고    scopus 로고
    • The Resurrecting Duckling-What Next?
    • Proc 8th Security Protocols Workshop, Springer-Verlag, Berlin
    • Stajano F. The Resurrecting Duckling-What Next?. Proc 8th Security Protocols Workshop. Lecture Notes in Computer Science vol. 2133 (2001), Springer-Verlag, Berlin 204-214
    • (2001) Lecture Notes in Computer Science , vol.2133 , pp. 204-214
    • Stajano, F.1
  • 26
    • 12744276083 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Zhang Y., Lee W., and Huang Y. Intrusion detection techniques for mobile wireless networks. ACM MONET Journal (2002)
    • (2002) ACM MONET Journal
    • Zhang, Y.1    Lee, W.2    Huang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.