메뉴 건너뛰기




Volumn 1, Issue , 2010, Pages 582-585

Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks

Author keywords

Anonymity; Cryptography; MANET; Multipath routing; Secret sharing; Security

Indexed keywords

ACTIVE ATTACK; ANONYMOUS ROUTING; DATA TRANSMISSION; INTRINSIC CHARACTERISTICS; LOCATION ANONYMITY; MANET; MULTI PATH ROUTING; MULTIPATH ROUTING PROTOCOLS; PASSIVE ATTACKS; SECRET SHARING; SECURE MOBILE AD HOC NETWORKS; SECURITY AND PERFORMANCE; SECURITY AND PRIVACY; SIMULATION RESULT; SINGLE PATH;

EID: 77953142354     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICMTMA.2010.602     Document Type: Conference Paper
Times cited : (12)

References (19)
  • 1
    • 2342625273 scopus 로고    scopus 로고
    • Analysis of multipath routing, part2: Mitigation of the effects of frequently changing network topologies
    • Mar.
    • A. Tsirigos and Z.J. Haas, "Analysis of multipath routing, part2: Mitigation of the effects of frequently changing network topologies," IEEE Transactions on Wireless Communications, vol. 3, no. 2, pp. 500-511, Mar. 2004.
    • (2004) IEEE Transactions on Wireless Communications , vol.3 , Issue.2 , pp. 500-511
    • Tsirigos, A.1    Haas, Z.J.2
  • 2
    • 15244339622 scopus 로고    scopus 로고
    • Authenticated Routing for Ad Hoc Networks
    • Mar.
    • K. Sanzgiri ea al., "Authenticated Routing for Ad Hoc Networks," IEEE journal on selected areas in communications, vol. 23, no. 3, pp. 598-610, Mar. 2005.
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.3 , pp. 598-610
    • Sanzgiri, K.1
  • 3
    • 33750029995 scopus 로고    scopus 로고
    • SecMR - A secure multipath routing protocol for ad hoc networks
    • Jan.
    • R. Mavropodi et al., "SecMR - a secure multipath routing protocol for ad hoc networks," Ad Hoc Networks, vol. 5, no. 1, pp. 87-99, Jan. 2007.
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 87-99
    • Mavropodi, R.1
  • 4
    • 60049091288 scopus 로고    scopus 로고
    • SPREAD: Improving network security by multipath routing in mobile ad hoc networks
    • Apr.
    • W. Lou et al., "SPREAD: Improving network security by multipath routing in mobile ad hoc networks," Wireless Networks, vol. 15, no.3, pp. 279-294, Apr. 2009.
    • (2009) Wireless Networks , vol.15 , Issue.3 , pp. 279-294
    • Lou, W.1
  • 7
    • 33748622050 scopus 로고    scopus 로고
    • MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks
    • Sep.
    • Y. Zhang et al., "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks," IEEE transactions on wireless communication, vol. 5, no. 9, pp. 2376-2385, Sep. 2006.
    • (2006) IEEE Transactions on Wireless Communication , vol.5 , Issue.9 , pp. 2376-2385
    • Zhang, Y.1
  • 9
    • 34347244961 scopus 로고    scopus 로고
    • An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
    • Aug.
    • J. Kong et al., "An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks," IEEE transactions on mobile computing, vol. 6, no. 8, pp. 888-902, Aug. 2007.
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.8 , pp. 888-902
    • Kong, J.1
  • 11
    • 34248678132 scopus 로고    scopus 로고
    • A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    • Jul.
    • R. Lu et al., "A secure anonymous routing protocol with authenticated key exchange for ad hoc networks," Computer Standards and Interfaces, vol. 29, no. 5, pp. 521-527, Jul. 2007.
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.5 , pp. 521-527
    • Lu, R.1
  • 12
    • 49549085074 scopus 로고    scopus 로고
    • Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    • May.
    • H. MS et al., "Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks," Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, May. 2008.
    • (2008) Computer Systems Science and Engineering , vol.23 , Issue.3 , pp. 227-234
    • Ms, H.1
  • 14
    • 54849405011 scopus 로고    scopus 로고
    • Improving security and performance of an Ad Hoc network through a multipath routing strategy
    • Nov.
    • H. Aiache et al., "Improving security and performance of an Ad Hoc network through a multipath routing strategy," Journal in Computer Virology, vol. 4, no. 4, pp. 267-278, Nov. 2008.
    • (2008) Journal in Computer Virology , vol.4 , Issue.4 , pp. 267-278
    • Aiache, H.1
  • 15
    • 67650409732 scopus 로고    scopus 로고
    • ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks
    • doi:10.1016/j.adhoc.2009.04.010
    • Y. Dong et al., "ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks," Ad Hoc Networks (2009), doi:10.1016/j.adhoc.2009.04.010.
    • (2009) Ad Hoc Networks
    • Dong, Y.1
  • 16
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Nov.
    • A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 18
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Sep.
    • Y. Zhang et al., "Intrusion detection techniques for mobile wireless networks," Wireless Networks, vol. 9, no. 5, pp. 545-556, Sep. 2003.
    • (2003) Wireless Networks , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.