메뉴 건너뛰기




Volumn 22, Issue 4, 2010, Pages 481-502

A secure multipath routing protocol in mobile ad hoc networks

Author keywords

MANET; Multipath; Routing; Security

Indexed keywords

DENIAL-OF-SERVICE ATTACK; HEURISTIC ALGORITHMS; MOBILE AD HOC NETWORKS; MOBILE SECURITY; NETWORK ROUTING; QUALITY OF SERVICE; ROUTING PROTOCOLS;

EID: 77449136795     PISSN: 15320626     EISSN: 15320634     Source Type: Journal    
DOI: 10.1002/cpe.1506     Document Type: Article
Times cited : (2)

References (32)
  • 1
    • 85031307530 scopus 로고
    • Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
    • Perkins C, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Computer Communication Review 1994; 24(4):234-244.
    • (1994) ACM SIGCOMM Computer Communication Review , vol.24 , Issue.4 , pp. 234-244
    • Perkins, C.1    Bhagwat, P.2
  • 3
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks
    • Johnson D, Maltz D, Broch J et al. DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad hoc Networking 2001; 5:139-172.
    • (2001) Ad Hoc Networking , vol.5 , pp. 139-172
    • Johnson, D.1    Maltz, D.2    Broch, J.3
  • 4
    • 11244252132 scopus 로고    scopus 로고
    • Denial of service resilience in ad hoc networks
    • Philadelphia, PA, September
    • Aad I, Hubaux JP, Knightly E. Denial of service resilience in ad hoc networks. Proceedings of ACM MobiCom, Philadelphia, PA, September 2004.
    • (2004) Proceedings of ACM MobiCom
    • Aad, I.1    Hubaux, J.P.2    Knightly, E.3
  • 6
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Hu Y, Perrig A, Johnson D. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 2005; 11(1):21-38.
    • (2005) Wireless Networks , vol.11 , Issue.1 , pp. 21-38
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 8
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Hu Y, Johnson D, Perrig A. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 2003; I:175-192.
    • (2003) Ad Hoc Networks , vol.1 , pp. 175-192
    • Hu, Y.1    Johnson, D.2    Perrig, A.3
  • 10
    • 5044238739 scopus 로고    scopus 로고
    • CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • Portoroz, Slovenia, 22 September
    • Michiardi P, Molva R. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. CMS'2002, Communication and Multimedia Security 2002 Conference, Portoroz, Slovenia, 22 September 2002.
    • (2002) CMS'2002, Communication and Multimedia Security 2002 Conference
    • Michiardi, P.1    Molva, R.2
  • 11
  • 16
    • 43449139418 scopus 로고    scopus 로고
    • Robust multi-path zone routing protocol for video transport over reconfigurable wireless networks
    • Wu Z, Sun Y, Wu J, Ye S. Robust multi-path zone routing protocol for video transport over reconfigurable wireless networks. Signal Processing Systems 2008; 51(2):183-194.
    • (2008) Signal Processing Systems , vol.51 , Issue.2 , pp. 183-194
    • Wu, Z.1    Sun, Y.2    Wu, J.3    Ye, S.4
  • 17
    • 61449186473 scopus 로고    scopus 로고
    • Maintaining colored trees for disjoint multipath routing under node failures
    • Jayavelu G, Ramasubramanian S, Younis O. Maintaining colored trees for disjoint multipath routing under node failures. IEEE/ACM Transactions on Networking 2009; 17(1):346-359.
    • (2009) IEEE/ACM Transactions on Networking , vol.17 , Issue.1 , pp. 346-359
    • Jayavelu, G.1    Ramasubramanian, S.2    Younis, O.3
  • 22
    • 0242426103 scopus 로고    scopus 로고
    • The tesla broadcast authentication protocol
    • Perrig A, Canetti R, Tygar D, Song D. The tesla broadcast authentication protocol. Cryptobytes 2002; 5-2:2-13.
    • (2002) Cryptobytes , vol.5 , Issue.2 , pp. 2-13
    • Perrig, A.1    Canetti, R.2    Tygar, D.3    Song, D.4
  • 24
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L. Password authentication with insecure communication. Communications of the ACM 1981; 24(11):770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 25
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Communications of the ACM 1979; 22(11):612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 31
    • 38649102081 scopus 로고
    • Performance of symmetric ciphers and one-way hash functions
    • Springer: London, U.K.
    • Roe M. Performance of symmetric ciphers and one-way hash functions. Fast Software Encryption, Cambridge Security Workshop. Springer: London, U.K., 1994; 83-89.
    • (1994) Fast Software Encryption, Cambridge Security Workshop , pp. 83-89
    • Roe, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.