메뉴 건너뛰기




Volumn , Issue , 2010, Pages

An opportunistic batch bundle authentication scheme for energy constrained DTNs

Author keywords

Batch authentication; Bundle security; DTN

Indexed keywords

AUTHENTICATION SCHEME; BATCH AUTHENTICATION; BATCH VERIFICATION; COMMUNICATION COST; COMPUTATION TIME; COMPUTATIONAL OVERHEADS; DELAY TOLERANT NETWORKS; ENERGY CONSUMPTION; ENERGY-CONSTRAINED; INTERMEDIATE NODE; MULTIHOP TRANSMISSION; NOVEL CONCEPT; POWER CONSUMPTION; PUBLIC-KEY SIGNATURES; SECURITY PROTOCOL SPECIFICATIONS; SECURITY SERVICES; SIMULATION RESULT; SWITCHED NETWORKS; TRANSMISSION CHARACTERISTICS; TREE HEIGHT;

EID: 77953306183     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5462166     Document Type: Conference Paper
Times cited : (42)

References (25)
  • 1
    • 77249094411 scopus 로고    scopus 로고
    • Multicasting in Delay Tolerant Networks: A Social Network Perspective
    • W. Gao, Q. Li, B. Zhao and G. Cao, "Multicasting in Delay Tolerant Networks: A Social Network Perspective," Proc. ACM Mobihoc'09, 2009.
    • Proc. ACM Mobihoc'09, 2009
    • Gao, W.1    Li, Q.2    Zhao, B.3    Cao, G.4
  • 2
    • 40749113163 scopus 로고    scopus 로고
    • Efficient routing in intermittently connected mobile networks: The multiple-copy cast
    • Feb
    • T. Spyropoulos, K. Psounis and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: the multiple-copy cast," IEEE/ACM Trans. on Networking, vol. 16, no. 1, pp. 77-89, Feb. 2008.
    • (2008) IEEE/ACM Trans. on Networking , vol.16 , Issue.1 , pp. 77-89
    • Spyropoulos, T.1    Psounis, K.2    Raghavendra, C.S.3
  • 3
    • 70349684505 scopus 로고    scopus 로고
    • Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets
    • F. Li, A. Srinivasan, and J. Wu, "Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets," Proc. of INFOCOM' 09, 2009.
    • Proc. of INFOCOM' 09, 2009
    • Li, F.1    Srinivasan, A.2    Wu, J.3
  • 4
    • 70350238158 scopus 로고    scopus 로고
    • SMART: A Secure Multi-Layer Credit based Incentive Scheme for Delay-Tolerant Networks
    • H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, "SMART: A Secure Multi-Layer Credit based Incentive Scheme for Delay-Tolerant Networks," IEEE Trans. on Vehicular Technology, vol.58, no. 8, pp. 4628-4639, 2009.
    • (2009) IEEE Trans. on Vehicular Technology , vol.58 , Issue.8 , pp. 4628-4639
    • Zhu, H.1    Lin, X.2    Lu, R.3    Fan, Y.4    Shen, X.5
  • 7
    • 44649172478 scopus 로고    scopus 로고
    • DTN: An architectural retrospective
    • June
    • K. Fall and S. Farrell, "DTN: An architectural retrospective," IEEE J. Sel. Areas Commun., vol. 26, no. 5, pp. 828-836, June 2008.
    • (2008) IEEE J. Sel. Areas Commun. , vol.26 , Issue.5 , pp. 828-836
    • Fall, K.1    Farrell, S.2
  • 12
    • 38049146172 scopus 로고    scopus 로고
    • Batch verification of short signatures
    • EUROCRYPT 2007
    • J.L. Camenisch, S. Hohenberger, M.Pedersen,"Batch verification of short signatures," EUROCRYPT 2007, LNCS, vol. 4515, pp.246-263, 2007.
    • (2007) LNCS , vol.4515 , pp. 246-263
    • Camenisch, J.L.1    Hohenberger, S.2    Pedersen, M.3
  • 13
    • 84946840347 scopus 로고    scopus 로고
    • Short signature from the Weil Pairing
    • D. Boneh, B. Lynn, H. Shacham, "Short signature from the Weil Pairing," ASIACRYPT 2001, vol.2248, pp.514-532, 2001.
    • (2001) ASIACRYPT 2001 , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 15
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • J. C. Cha and J. H. Cheon, "An identity-based signature from gap Diffie-Hellman groups," Proc. of PKC'03, vol. 2567, pp. 18-30. 2003.
    • (2003) Proc. of PKC'03 , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 16
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity-based signature schemes based on pairing
    • SAC 2002
    • F.Hess, "Efficient identity-based signature schemes based on pairing,", SAC 2002, LNCS, vol. 2595, pp. 310-324, 2002.
    • (2002) LNCS , vol.2595 , pp. 310-324
    • Hess, F.1
  • 17
    • 77953317265 scopus 로고    scopus 로고
    • Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
    • B. J. Matt, "Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures," PKC 2009, 2009.
    • (2009) PKC 2009
    • Matt, B.J.1
  • 18
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • R. Merkle, "Protocols for public key cryptosystems," Proc. of IEEE S&P, pp. 122-133, 1980.
    • (1980) Proc. of IEEE S&P , pp. 122-133
    • Merkle, R.1
  • 19
    • 70349270769 scopus 로고    scopus 로고
    • Efficient security primitives derived from a secure aggregation algorithm
    • H. Chan and A. Perrig, "Efficient security primitives derived from a secure aggregation algorithm," Proc. of CCS'08, 2008.
    • Proc. of CCS'08, 2008
    • Chan, H.1    Perrig, A.2
  • 22
    • 84872477069 scopus 로고    scopus 로고
    • The One Simulator: http://www.netlab.tkk.fi/tutkimus/dtn/theone/.
    • The One Simulator
  • 24
    • 43549089535 scopus 로고    scopus 로고
    • Multi-user broadcast authentication in wireless sensor networks
    • K. Ren, W. Lou and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks," Proc. of SECON'07, 2007.
    • Proc. of SECON'07, 2007
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 25
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks
    • Y. Zhang, W. Liu,W. Lou, and Y. Fang, "Location-based compromise-tolerant security mechanisms for wireless sensor networks," IEEE J. Sel. Areas Commun., vol. 24, no.2, pp.247-260, 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.