메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Preventing unauthorized messages in DTN based mobile ad hoc networks

Author keywords

Connectivity; Delay tolerant network (DTN); Heterogeneous wireless networks; Intermittent links; Security; Unathorized traffic

Indexed keywords

ASYMMETRIC KEY CRYPTOGRAPHY; COMPUTATION OVERHEADS; DELAY TOLERANT NETWORKS; HETEROGENEOUS WIRELESS NETWORK; INTERMEDIATE NETWORKS; INTERMEDIATE NODE; KEY CHAIN; MOBILE NODES; NETWORK COVERAGE; NETWORK INFRASTRUCTURE; NETWORK MANAGERS; SECURITY CHALLENGES; SIMULATION STUDIES; SUPERNODES; SYMMETRIC KEY CRYPTOGRAPHY; SYSTEM ARCHITECTURES;

EID: 77951609111     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2009.5425467     Document Type: Conference Paper
Times cited : (10)

References (11)
  • 1
    • 62249166562 scopus 로고    scopus 로고
    • DTN based dominating set routing for MANET in heterogeneous wireless networking
    • April
    • H. Samuel, W. Zhuang, and B. Preiss, "DTN based dominating set routing for MANET in heterogeneous wireless networking," Mobile Networks and Applications, vol. 14, pp. 154-164, April 2009.
    • (2009) Mobile Networks and Applications , vol.14 , pp. 154-164
    • Samuel, H.1    Zhuang, W.2    Preiss, B.3
  • 2
    • 51249097215 scopus 로고    scopus 로고
    • Routing over interconnected heterogeneous wireless networks with intermittent connections
    • May
    • H. Samuel, W. Zhuang, and B. Preiss, "Routing over interconnected heterogeneous wireless networks with intermittent connections," in Proc. IEEE ICC '08, pp. 2282-2286, May 2008.
    • (2008) Proc. IEEE ICC '08 , pp. 2282-2286
    • Samuel, H.1    Zhuang, W.2    Preiss, B.3
  • 6
    • 43549089535 scopus 로고    scopus 로고
    • Multi-user broadcast authentication in wireless sensor networks
    • June
    • K. Ren, W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks," in Proc. IEEE SECON '07, pp. 223-232, June 2007.
    • (2007) Proc. IEEE SECON '07 , pp. 223-232
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 7
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.P.2
  • 8
    • 51249100419 scopus 로고    scopus 로고
    • RAISE: An efficient rsu-aided message authentication scheme in vehicular communication networks
    • May
    • C. Zhang, X. Lin, R. Lu, and P.-H. Ho, "RAISE: An efficient rsu-aided message authentication scheme in vehicular communication networks," in Proc. IEEE ICC '08, pp. 1451-1457, May 2008.
    • (2008) Proc. IEEE ICC '08 , pp. 1451-1457
    • Zhang, C.1    Lin, X.2    Lu, R.3    Ho, P.-H.4
  • 9
    • 37849034148 scopus 로고    scopus 로고
    • Surviving attacks on disruption-tolerant networks without authentication
    • J. Burgess, G. D. Bissias, M. D. Corner, and B. N. Levine, "Surviving attacks on disruption-tolerant networks without authentication," in Proc. ACM MobiHoc '07, pp. 61-70, 2007.
    • (2007) Proc. ACM MobiHoc '07 , pp. 61-70
    • Burgess, J.1    Bissias, G.D.2    Corner, M.D.3    Levine, B.N.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.