메뉴 건너뛰기




Volumn , Issue , 2007, Pages 157-165

HEAP: Hop-by-hop efficient authentication protocol for mobile Ad-hoc networks

Author keywords

Authentication; HEAP; MANETs; Mobile Ad hoc networks; Security

Indexed keywords

AUTHENTICATION SCHEME; EFFICIENT AUTHENTICATION; HEAP; MAN IN THE MIDDLES (MITM); MANETS; MOBILE ADHOC NETWORK (MANETS); PACKET DELIVERY RATIO; SECURITY;

EID: 77955022289     PISSN: 07359276     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (23)
  • 3
    • 24744455885 scopus 로고    scopus 로고
    • A lightweight authentication protocol for mobile ad hoc networks
    • B. Lu and U. W. Pooch, "A Lightweight Authentication Protocol for Mobile Ad Hoc Networks," International Journal of Information Technology, Vol. 11, no. 2, pp. 119-135, 2005.
    • (2005) International Journal of Information Technology , vol.11 , Issue.2 , pp. 119-135
    • Lu, B.1    Pooch, U.W.2
  • 5
    • 84893457313 scopus 로고    scopus 로고
    • Internet X. 509 public key infrastructure: PKIX roadmap
    • PKIX Working Group
    • A. Aresenault and S. Turner, "Internet X. 509 Public Key Infrastructure: PKIX Roadmap,", IETF Internet Draft, PKIX Working Group, 2000.
    • (2000) IETF Internet Draft
    • Aresenault, A.1    Turner, S.2
  • 9
    • 0036924499 scopus 로고    scopus 로고
    • On-demand multicast routing protocol in multihop wireless mobile networks
    • S. Lee, W. Su, and M. Gerla, "On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks," Mobile Networks and Applications, v. 7, n. 6, p. 441-453, 2002.
    • (2002) Mobile Networks and Applications , vol.7 , Issue.6 , pp. 441-453
    • Lee, S.1    Su, W.2    Gerla, M.3
  • 11
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y. Hu, A. Perrig, D. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proceedings of Mobicom, 2002.
    • (2002) Proceedings of Mobicom
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 12
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • November/December
    • L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, 13(6) November/December 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.2
  • 16
    • 0013294745 scopus 로고    scopus 로고
    • Protecting routing infrastructures from denial of service using cooperative intrusion detection
    • S. Cheung and K. Levitt, "Protecting routing infrastructures from denial of service using cooperative intrusion detection," in New Security Paradigms Workshop, 1997.
    • (1997) New Security Paradigms Workshop
    • Cheung, S.1    Levitt, K.2
  • 19
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," ACM CCS, 2002.
    • (2002) ACM CCS
    • Eschenauer, L.1    Gligor, V.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.