메뉴 건너뛰기




Volumn 21, Issue 2, 2010, Pages 203-215

PEACE: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks

Author keywords

Anonymous communication; Authentication; Privacy; Security; Wireless mesh networks

Indexed keywords

ANONYMOUS COMMUNICATION; AUTHENTICATION AND KEY AGREEMENTS; BROADBAND INTERNET ACCESS; FREE-RIDERS; GROUP SIGNATURES; MULTI-HOP WIRELESS MESH NETWORKS; PRIVACY PRESERVATION; SECURITY AND PRIVACY; SECURITY AND PRIVACY ISSUES; SECURITY FRAMEWORKS; SECURITY RESEARCH; SERVICE ORIENTED; USER ACCESS CONTROL; USER PRIVACY;

EID: 75449091361     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2009.59     Document Type: Article
Times cited : (41)

References (30)
  • 1
  • 2
    • 13844296355 scopus 로고    scopus 로고
    • Wireless mesh networks: A survey
    • Mar.
    • I.F. Akyildiz, X. Wang, and W. Wang, "Wireless Mesh Networks: A Survey," Computer Networks, vol.47, no.4, pp. 445-487, Mar. 2005.
    • (2005) Computer Networks , vol.47 , Issue.4 , pp. 445-487
    • Akyildiz, I.F.1    Wang, X.2    Wang, W.3
  • 4
    • 34547545598 scopus 로고    scopus 로고
    • A secure authentication and billing architecture for wireless mesh networks
    • to be published
    • Y. Zhang and Y. Fang, "A Secure Authentication and Billing Architecture for Wireless Mesh Networks," ACM Wireless Networks, to be published.
    • ACM Wireless Networks
    • Zhang, Y.1    Fang, Y.2
  • 5
    • 33749856769 scopus 로고    scopus 로고
    • ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks
    • Oct.
    • Y. Zhang and Y. Fang, "ARSA: An Attack-Resilient Security Architecture for Multi-Hop Wireless Mesh Networks," IEEE J. Selected Areas in Comm., vol.24, no.10, pp. 1916-1928, Oct. 2006.
    • (2006) IEEE J. Selected Areas in Comm. , vol.24 , Issue.10 , pp. 1916-1928
    • Zhang, Y.1    Fang, Y.2
  • 6
    • 75449089971 scopus 로고    scopus 로고
    • "The Wimax Forum,"http://www.wimaxforum.org. 2009.
    • (2009)
  • 10
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol.21, no.2, pp. 120-126, 1978.
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 12
    • 1542326337 scopus 로고    scopus 로고
    • A micro-payment scheme encouraging collaboration in multi-hop cellular networks
    • N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, "A Micro- Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks," Proc. ACM MobiHoc, 2003.
    • (2003) Proc. ACM MobiHoc
    • Salem, N.1    Buttyan, L.2    Hubaux, J.3    Jakobsson, M.4
  • 14
    • 25844443821 scopus 로고    scopus 로고
    • Anonymous communications in mobile ad hoc networks
    • Mar.
    • Y. Zhang, W. Liu, and W. Lou, "Anonymous Communications in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, Mar. 2005.
    • (2005) Proc. IEEE INFOCOM
    • Zhang, Y.1    Liu, W.2    Lou, W.3
  • 15
    • 33748622050 scopus 로고    scopus 로고
    • MASK: Anonymous on-demand routing in mobile Ad Hoc networks
    • DOI 10.1109/TWC.2006.1687761, 1687761
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous On- Demand Routing in Mobile Ad Hoc Networks," IEEE Trans. Wireless Comm., vol.5, no.9, pp. 2376-2385, Sept. 2006. (Pubitemid 44376150)
    • (2006) IEEE Transactions on Wireless Communications , vol.5 , Issue.9 , pp. 2376-2385
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 16
    • 34347244961 scopus 로고    scopus 로고
    • An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks
    • Aug.
    • J. Kong, X. Hong, and M. Gerla, "An Identity-Free and On- Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol.6, no.8, pp. 888-902, Aug. 2007.
    • (2007) IEEE Trans. Mobile Computing , vol.6 , Issue.8 , pp. 888-902
    • Kong, J.1    Hong, X.2    Gerla, M.3
  • 19
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • D. Boneh, H. Shacham, and B. Lynn, "Short Signatures from the Weil Pairing," J. Cryptology, vol.17, no.4, pp. 297-319, 2004.
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Shacham, H.2    Lynn, B.3
  • 20
    • 75449111693 scopus 로고    scopus 로고
    • TinyECC Library
    • TinyECC Library, http://discovery.csc.ncsu.edu/software/ TinyECC/index.html, 2009.
    • (2009)
  • 21
    • 33646706570 scopus 로고    scopus 로고
    • Securing wireless mesh networks
    • Apr.
    • N. Ben Salem and J.-P. Hubaux, "Securing Wireless Mesh Networks," IEEE Wireless Comm., vol.13, no.2, pp. 50-55, Apr. 2006.
    • (2006) IEEE Wireless Comm , vol.13 , Issue.2 , pp. 50-55
    • Ben Salem, N.1    Hubaux, J.-P.2
  • 26
    • 58149131215 scopus 로고    scopus 로고
    • Tua: A novel compromise-resilient authentication architecture for wireless mesh networks
    • Apr.
    • X. Lin, R. Lu, P.-H. Ho, X. Shen, and Z. Cao, "Tua: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks," IEEE Wireless Comm., vol.7, no.4, pp. 1389-1399, Apr. 2008.
    • (2008) IEEE Wireless Comm , vol.7 , Issue.4 , pp. 1389-1399
    • Lin, X.1    Lu, R.2    Ho, P.-H.3    Shen, X.4    Cao, Z.5
  • 27
    • 51849141536 scopus 로고    scopus 로고
    • A novel localized authentication scheme in Ieee 802.11 based wireless mesh networks
    • X. Lin, X. Ling, H. Zhu, P.-H. Ho, and X. Shen, "A Novel Localized Authentication Scheme in ieee 802.11 Based Wireless Mesh Networks," Int'l J. Security and Networks, vol.3, no.2, pp. 122- 132, 2008.
    • (2008) Int'l J. Security and Networks , vol.3 , Issue.2 , pp. 122-132
    • Lin, X.1    Ling, X.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5
  • 28
    • 33746373934 scopus 로고    scopus 로고
    • A novel privacy preserving authentication and access control scheme for pervasive computing environment
    • July
    • K. Ren, W. Lou, K. Kim, and R. Deng, "A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environment" IEEE Trans. Vehicular Technology, vol.55, no.4, pp. 1373-1384, July 2006.
    • (2006) IEEE Trans. Vehicular Technology , vol.55 , Issue.4 , pp. 1373-1384
    • Ren, K.1    Lou, W.2    Kim, K.3    Deng, R.4
  • 29
    • 33846307093 scopus 로고    scopus 로고
    • Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability
    • K. Ren and W. Lou, "Privacy-Enhanced, Attack-Resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability," ACM Mobile Networks and Applications (MONET) (special issue on wireless broadband access), vol.12, pp. 79-92, 2007.
    • (2007) ACM Mobile Networks and Applications (MONET) (Special Issue on Wireless Broadband Access) , vol.12 , pp. 79-92
    • Ren, K.1    Lou, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.