메뉴 건너뛰기




Volumn 1, Issue 1-2, 2006, Pages 84-94

Wireless networking security: open issues in trust, management, interoperation and measurement

Author keywords

interoperation; management; measurement; trust; wireless network security

Indexed keywords


EID: 74549166520     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2006.010825     Document Type: Article
Times cited : (16)

References (82)
  • 3
    • 4544342186 scopus 로고    scopus 로고
    • Best current practices for Wireless Internet Service Provider (WISP) roaming, version 1.0.
    • Anton, B., Bullock, B. and Short, J. (2003) ‘Best current practices for Wireless Internet Service Provider (WISP) roaming, version 1.0.’, Wi-Fi Alliance.
    • (2003) Wi-Fi Alliance
    • Anton, B.1    Bullock, B.2    Short, J.3
  • 8
    • 3042829810 scopus 로고    scopus 로고
    • Integrating hterogeneous wireless technologies: a cellular-assisted mobile ad hoc networks
    • Bhargava, B., Wu, X., Lu, Y. and Wang, W. (2004) ‘Integrating hterogeneous wireless technologies: a cellular-assisted mobile ad hoc networks’, Mobile Network and Applications, Vol. 9, No. 4, pp.393–408.
    • (2004) Mobile Network and Applications , vol.9 , Issue.4 , pp. 393-408
    • Bhargava, B.1    Wu, X.2    Lu, Y.3    Wang, W.4
  • 15
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • Buttyan, L. and Hubaux, J-P. (2003) ‘Stimulating cooperation in self-organizing mobile ad hoc networks’, Mobile Networks and Applications, Vol. 8, No. 5, pp.579–592.
    • (2003) Mobile Networks and Applications , vol.8 , Issue.5 , pp. 579-592
    • Buttyan, L.1    Hubaux, J.-P.2
  • 17
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Capkun, S., Buttyan, L. and Hubaux, J-P. (2003) ‘Self-organized public-key management for mobile ad hoc networks’, IEEE Transactions on Mobile Computing, Vol. 2, No. 1, pp.52–64.
    • (2003) IEEE Transactions on Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.-P.3
  • 20
    • 0033154266 scopus 로고    scopus 로고
    • Internet-based mobile ad hoc networking
    • Corson, M., Maker, J. and Cernicione, J. (1999) ‘Internet-based mobile ad hoc networking’, IEEE Internet Computing, Vol. 3, No. 4, pp.63–70.
    • (1999) IEEE Internet Computing , vol.3 , Issue.4 , pp. 63-70
    • Corson, M.1    Maker, J.2    Cernicione, J.3
  • 21
    • 0003956839 scopus 로고    scopus 로고
    • IETF Request for Comments 2246
    • Dierks, T. and Allen, C. (1999) ‘The TLS protocol’, Available at: http://www.ietf.org/rfc/rfc2246.txt. IETF Request for Comments 2246.
    • (1999) The TLS protocol
    • Dierks, T.1    Allen, C.2
  • 32
    • 35248817953 scopus 로고    scopus 로고
    • A micropayment scheme encouraging collaboration in multi-hop cellular networks
    • Jakobsson, M., Hubaux, J-P. and Buttyan, L. (2003) ‘A micropayment scheme encouraging collaboration in multi-hop cellular networks’, Lecture Notes in Computer Science, Vol. 2742, pp.15–33.
    • (2003) Lecture Notes in Computer Science , vol.2742 , pp. 15-33
    • Jakobsson, M.1    Hubaux, J.-P.2    Buttyan, L.3
  • 35
    • 0000000447 scopus 로고    scopus 로고
    • Emerging challenges: mobile networking for smart dust
    • Kahn, J., Katz, R. and Pister, K. (2000) ‘Emerging challenges: mobile networking for smart dust’, Journal of Communications and Networks, Vol. 2, No. 3, pp.188–196.
    • (2000) Journal of Communications and Networks , vol.2 , Issue.3 , pp. 188-196
    • Kahn, J.1    Katz, R.2    Pister, K.3
  • 36
    • 4644320619 scopus 로고    scopus 로고
    • Performance evaluation of public key based authentication in future mobile communication systems
    • Kambourakis, G., Rouskas, A. and Gritzalis, S. (2004) ‘Performance evaluation of public key based authentication in future mobile communication systems’, EURASIP Journal on Wireless Communications and Networking, Vol. 2004, No. 1, pp.184–197.
    • (2004) EURASIP Journal on Wireless Communications and Networking , vol.2004 , Issue.1 , pp. 184-197
    • Kambourakis, G.1    Rouskas, A.2    Gritzalis, S.3
  • 41
    • 27744573242 scopus 로고    scopus 로고
    • Providing multi-layer security support for wireless communications across multiple trusted domains
    • Computer Science Department, UCLA
    • Kong, J., Gerla, M., Prabhu, B.S. and Gadh, R. (2002b) ‘Providing multi-layer security support for wireless communications across multiple trusted domains’, Technical Report 020032, Computer Science Department, UCLA.
    • (2002) Technical Report 020032
    • Kong, J.1    Gerla, M.2    Prabhu, B.S.3    Gadh, R.4
  • 47
    • 28044469699 scopus 로고    scopus 로고
    • A novel caching scheme for improving internet-based mobile ad hoc networks performance
    • Lim, S., Lee, W., Cao, G., Das, C. (2006) ‘A novel caching scheme for improving internet-based mobile ad hoc networks performance’, Ad Hoc Networks, Vol. 4, No. 2, pp.225–239.
    • (2006) Ad Hoc Networks , vol.4 , Issue.2 , pp. 225-239
    • Lim, S.1    Lee, W.2    Cao, G.3    Das, C.4
  • 48
    • 0033890503 scopus 로고    scopus 로고
    • Multihop cellular: a new architecture for wireless communications
    • Lin, Y. and Hsu, Y., (2000) ‘Multihop cellular: a new architecture for wireless communications’, Proceedings of IEEE INFOCOM 2000, pp.1273–1282.
    • (2000) Proceedings of IEEE INFOCOM 2000 , pp. 1273-1282
    • Lin, Y.1    Hsu, Y.2
  • 49
    • 0034997115 scopus 로고    scopus 로고
    • Transmission scheduling for efficient wireless utilization
    • Liu, X., Chong, E. and Shroff, N. (2001) ‘Transmission scheduling for efficient wireless utilization’, Proceedings of IEEE INFOCOM 2001, pp.776–785.
    • (2001) Proceedings of IEEE INFOCOM 2001 , pp. 776-785
    • Liu, X.1    Chong, E.2    Shroff, N.3
  • 63
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • Perrig, A., Stankovic, J. and Wagner, D. (2004) ‘Security in wireless sensor networks’, Communications of the ACM, Vol. 47, No. 6, pp.53–57.
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 65
    • 3142569233 scopus 로고    scopus 로고
    • Highly reliable trust establishment scheme in ad-hoc networks
    • Ren, K., Li, T., Wan, Z., Bao, F., Deng, R. and Kim, K. (2004) ‘Highly reliable trust establishment scheme in ad-hoc networks’, Computer Networks, Vol. 45, No. 6, pp.687–699.
    • (2004) Computer Networks , vol.45 , Issue.6 , pp. 687-699
    • Ren, K.1    Li, T.2    Wan, Z.3    Bao, F.4    Deng, R.5    Kim, K.6
  • 68
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A. (1979) ‘How to share a secret’, Communications of the ACM, Vol. 22, No. 11, pp.612–613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 69
    • 4544241048 scopus 로고    scopus 로고
    • IEEE802.11 roaming and authentication in wireless LAN/cellular mobile networks
    • Shi, M., Shen, X. and Mark, J. (2004) ‘IEEE802.11 roaming and authentication in wireless LAN/cellular mobile networks’, IEEE Wireless Communications, Vol. 11, No. 4, pp.66–75.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.4 , pp. 66-75
    • Shi, M.1    Shen, X.2    Mark, J.3
  • 73
    • 25444517601 scopus 로고    scopus 로고
    • Integration of authentication and mobility management in third generation and WLAN data networks
    • Wang, W., Liang, W. and Agarwal, A. (2005) ‘Integration of authentication and mobility management in third generation and WLAN data networks’, Journal of Wireless Communications and Mobile Computing, Vol. 5, No. 6, pp.665–678.
    • (2005) Journal of Wireless Communications and Mobile Computing , vol.5 , Issue.6 , pp. 665-678
    • Wang, W.1    Liang, W.2    Agarwal, A.3
  • 77
    • 11244279243 scopus 로고    scopus 로고
    • Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support
    • Zhang, J., Li, S., Weinstein, N. and Tu, N. (2002a) ‘Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support’, ACM Mobile Computing and Communications Review, Vol. 6, No. 3, pp.10–21.
    • (2002) ACM Mobile Computing and Communications Review , vol.6 , Issue.3 , pp. 10-21
    • Zhang, J.1    Li, S.2    Weinstein, N.3    Tu, N.4
  • 78
    • 1642403770 scopus 로고    scopus 로고
    • Comparison of inter-area rekeying algorithms for secure wireless group communications
    • Zhang, C., DeCleene, B., Kurose, J. and Towsley, D. (2002b) ‘Comparison of inter-area rekeying algorithms for secure wireless group communications’, Performance Evaluation, Vol. 49, Nos. 1-4, pp.1–20.
    • (2002) Performance Evaluation , vol.49 , Issue.1-4 , pp. 1-20
    • Zhang, C.1    DeCleene, B.2    Kurose, J.3    Towsley, D.4
  • 79
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks
    • Zhong, S., Yang, Y. and Chen. J. (2003) ‘Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks’, Proceedings of IEEE INFOCOM 2003, pp.1987–1997.
    • (2003) Proceedings of IEEE INFOCOM , vol.2003 , pp. 1987-1997
    • Zhong, S.1    Yang, Y.2    Chen., J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.