메뉴 건너뛰기




Volumn 4, Issue 4, 2010, Pages 352-360

Cluster-based secure communication mechanism in wireless ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

CLUSTER HEAD; CLUSTER-BASED; COMMUNICATION OVERLOAD; DIFFIE-HELLMAN KEY EXCHANGE PROTOCOL; DYNAMICAL NETWORKS; NETWORK ENVIRONMENTS; SECURE COMMUNICATIONS; SELF-ORGANISATION; SESSION KEY; SYNCHRONISATION;

EID: 78650363745     PISSN: 17518709     EISSN: 17518717     Source Type: Journal    
DOI: 10.1049/iet-ifs.2009.0120     Document Type: Article
Times cited : (13)

References (15)
  • 2
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • 1536-1284
    • Yang, H., Luo, H.Y., Ye, F., Lu, S.W., and Zhang, L.: ' Security in mobile ad hoc networks: challenges and solutions ', IEEE Wirel. Commun., 2004, p. 38-47 1536-1284
    • (2004) IEEE Wirel. Commun. , pp. 38-47
    • Yang, H.1    Luo, H.Y.2    Ye, F.3    Lu, S.W.4    Zhang, L.5
  • 3
    • 34548323745 scopus 로고    scopus 로고
    • Attack analysis and detection for ad hoc routing protocols
    • Huang, Y.A., and Lee, W.: ' Attack analysis and detection for ad hoc routing protocols ', Lecture Notes in Computer Science, 2004, p. 125-145
    • (2004) Lecture Notes in Computer Science , pp. 125-145
    • Huang, Y.A.1    Lee, W.2
  • 5
    • 33845753004 scopus 로고    scopus 로고
    • Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme
    • Huang, Y.M., Lin, H.Y., and Wang, T.I.: ' Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme ', J. Comput. Sci. Technol., 2006, 21, (6), p. 997-1011
    • (2006) J. Comput. Sci. Technol. , vol.21 , Issue.6 , pp. 997-1011
    • Huang, Y.M.1    Lin, H.Y.2    Wang, T.I.3
  • 7
    • 1342306709 scopus 로고    scopus 로고
    • Security for cluster based ad hoc networks
    • Varadharajan, V., Shankaran, R., and Hitchens, M.: ' Security for cluster based ad hoc networks ', Comput. Commun., 2004, 27, (5), p. 488-501
    • (2004) Comput. Commun. , vol.27 , Issue.5 , pp. 488-501
    • Varadharajan, V.1    Shankaran, R.2    Hitchens, M.3
  • 8
    • 36849013480 scopus 로고    scopus 로고
    • A hierarchy-based key management for secure group communications in mobile ad hoc networks
    • Wang, N.C., Li, M., and Fang, S.Z.: ' A hierarchy-based key management for secure group communications in mobile ad hoc networks ', Int. Conf. Wireless Communications and Mobile Computing, 2007, p. 571-576
    • (2007) Int. Conf. Wireless Communications and Mobile Computing , pp. 571-576
    • Wang, N.C.1    Li, M.2    Fang, S.Z.3
  • 11
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Capkun, S., Buttyan, L., and Hubaux, J.P.: ' Self-organized public-key management for mobile ad hoc networks ', IEEE Trans. Mobile Comput., 2003, 2, (1), p. 52-64
    • (2003) IEEE Trans. Mobile Comput. , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.P.3
  • 13
    • 0031234161 scopus 로고    scopus 로고
    • Adaptive clustering for mobile wireless networks
    • 0733-8716
    • Lin, C.R., and Gerla, M.: ' Adaptive clustering for mobile wireless networks ', IEEE J. Sel. Areas Commun., 1997, 15, (7), p. 1265-1275 0733-8716
    • (1997) IEEE J. Sel. Areas Commun. , vol.15 , Issue.7 , pp. 1265-1275
    • Lin, C.R.1    Gerla, M.2
  • 14
    • 34548020232 scopus 로고    scopus 로고
    • Adaptive security design with malicious node detection in cluster-based sensor networks
    • Hsieh, M.Y., Huang, Y.M., and Chao, H.C.: ' Adaptive security design with malicious node detection in cluster-based sensor networks ', Comput. Commun., 2007, 30, (11-12), p. 2385-2400
    • (2007) Comput. Commun. , vol.30 , Issue.1112 , pp. 2385-2400
    • Hsieh, M.Y.1    Huang, Y.M.2    Chao, H.C.3
  • 15
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • Hu, Y.C., and Perrig, A.: ' A survey of secure wireless ad hoc routing ', IEEE Security Privacy, 2004, 2, (3), p. 28-39
    • (2004) IEEE Security Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.C.1    Perrig, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.