메뉴 건너뛰기




Volumn 9, Issue 11, 2010, Pages 1608-1621

Integrity regions: Authentication through presence in wireless networks

Author keywords

Authentication; distance bounding; key establishment; node mobility; wireless networks.

Indexed keywords

DISTANCE BOUNDING; EXTENSIVE SIMULATIONS; INTENSIVE RESEARCH; KEY ESTABLISHMENTS; MESSAGE AUTHENTICATION; NODE MOBILITY; PEER TO PEER; SECURE COMMUNICATIONS; SECURITY PRIMITIVES; SECURITY THREATS; TIME-OF-ARRIVAL; ULTRASONIC RANGING; WIRELESS NODES;

EID: 77956946974     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2010.127     Document Type: Article
Times cited : (26)

References (47)
  • 2
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov
    • W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol.22, no.6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Information Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 7
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. ACM MobiHoc, 2005.
    • (2005) Proc. ACM MobiHoc
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 11
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in Ad-Hoc networks
    • Nov
    • N. Asokan and P. Ginzboorg, "Key Agreement in Ad-Hoc Networks," Computer Comm., vol.23, no.17, pp. 1627-1637, Nov. 2000.
    • (2000) Computer Comm. , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 12
    • 3142579333 scopus 로고    scopus 로고
    • Hash visualization: A new technique to improve real-world security
    • citeseer. ist.psu.edu/perrig99hash.html
    • A. Perrig and D. Song, "Hash Visualization: A New Technique to Improve Real-World Security," Proc. Intl Workshop Cryptographic Techniques and E-Commerce (CrypTEC 99), pp. 131-138, citeseer. ist.psu.edu/perrig99hash. html, 1999.
    • (1999) Proc. Intl Workshop Cryptographic Techniques and E-Commerce (CrypTEC 99) , pp. 131-138
    • Perrig, A.1    Song, D.2
  • 14
    • 77956950305 scopus 로고    scopus 로고
    • Private Communication with M. Jakobsson
    • J.-O. Larsson and M. Jakobsson, "Shake," Private Communication with M. Jakobsson.
    • Shake
    • Larsson, J.-O.1    Jakobsson, M.2
  • 16
    • 51249099680 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings: Preliminary version
    • Cryptology ePrint Archive
    • S. Laur, N. Asokan, and K. Nyberg, "Efficient Mutual Data Authentication Using Manually Authenticated Strings: Preliminary Version," Report 2005/424, Cryptology ePrint Archive, 2005.
    • (2005) Report 2005/424
    • Laur, S.1    Asokan, N.2    Nyberg, K.3
  • 17
    • 77953853641 scopus 로고    scopus 로고
    • Shake them up!: A movement-based pairing protocol for CPU-constrained devices
    • C. Castelluccia and P. Mutaf, "Shake Them Up!: A Movement-Based Pairing Protocol for CPU-Constrained Devices," Proc. ACM MobiSys, pp. 51-64, 2005.
    • (2005) Proc. ACM MobiSys , pp. 51-64
    • Castelluccia, C.1    Mutaf, P.2
  • 25
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc networks
    • Nov./Dec
    • L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks," IEEE Network, vol.13, no.6, pp. 24-30, Nov./Dec. 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 27
    • 0013093839 scopus 로고    scopus 로고
    • Child-proof authentication for MIPv6 (CAM)
    • Apr
    • G. OShea and M. Roe, "Child-Proof Authentication for MIPv6 (CAM)," ACM SIGCOMM Computer Comm. Rev., vol.31, pp. 4-8, Apr. 2001.
    • (2001) ACM SIGCOMM Computer Comm. Rev. , vol.31 , pp. 4-8
    • Oshea, G.1    Roe, M.2
  • 40
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct
    • A. Wood and J. Stankovic, "Denial of Service in Sensor Networks," Computer, vol.35, no.10, pp. 54-62, Oct. 2002.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.2
  • 42
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in Ad Hoc wireless networks
    • T. Imielinski and H. Korth, eds., chap. 5 Kluwer Academic Publishers
    • D. Johnson and D. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, T. Imielinski and H. Korth, eds., chap. 5, pp. 153-181, Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.1    Maltz, D.2
  • 43
    • 70349656216 scopus 로고    scopus 로고
    • SWIM: A simple model to generate small mobile worlds
    • Apr
    • A. Mei and J. Stefa, "SWIM: A Simple Model to Generate Small Mobile Worlds," Proc. IEEE INFOCOM, Apr. 2009.
    • (2009) Proc. IEEE INFOCOM
    • Mei, A.1    Stefa, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.