메뉴 건너뛰기




Volumn 5, Issue 2, 2010, Pages 152-163

Preventing unauthorized messages and achieving end-to-end security in delay tolerant heterogeneous wireless networks

Author keywords

Connectivity; Delay tolerant network (DTN); End to end information security; Heterogeneous wireless networks; Intermittent links; Prevention of unauthorized traffic

Indexed keywords

ASYMMETRIC KEY CRYPTOGRAPHY; CHALLENGED NETWORKS; COMPUTATION OVERHEADS; DELAY TOLERANT; DELAY TOLERANT NETWORKS; END-TO-END SECURITY; GEOGRAPHIC COVERAGE; HETEROGENEOUS WIRELESS NETWORK; INFORMATION SECURITY; INTERMEDIATE NODE; INTERNET BACKBONE; KEY CHAIN; MESSAGE EXCHANGE; MOBILE NODES; NETWORK DOMAINS; NETWORK INFRASTRUCTURE; NETWORK SERVER; SIMULATION STUDIES; SUPERNODES; SYMMETRIC KEY CRYPTOGRAPHY; SYMMETRIC KEYS; SYSTEM ARCHITECTURES;

EID: 78651586483     PISSN: 17962021     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcm.5.2.152-163     Document Type: Article
Times cited : (9)

References (22)
  • 1
    • 62249166562 scopus 로고    scopus 로고
    • DTN based dominating set routing for MANET in heterogeneous wireless networking
    • April
    • H. Samuel, W. Zhuang, and B. Preiss, "DTN based dominating set routing for MANET in heterogeneous wireless networking," Mobile Networks and Applications, vol. 14, pp. 154-164, April 2009.
    • (2009) Mobile Networks and Applications , vol.14 , pp. 154-164
    • Samuel, H.1    Zhuang, W.2    Preiss, B.3
  • 2
    • 51249097215 scopus 로고    scopus 로고
    • Routing over interconnected heterogeneous wireless networks with intermittent connections
    • May
    • H. Samuel, W. Zhuang, and B. Preiss, "Routing over interconnected heterogeneous wireless networks with intermittent connections," in Proc. IEEE ICC'08, pp. 2282-2286, May 2008.
    • (2008) Proc. IEEE Icc'08 , pp. 2282-2286
    • Samuel, H.1    Zhuang, W.2    Preiss, B.3
  • 3
    • 1242310099 scopus 로고    scopus 로고
    • A delay-tolerant network architecture for challenged internets," in
    • K. Fall, "A delay-tolerant network architecture for challenged internets," in Proc. ACM SIGCOMM'03, pp. 27-34, 2003.
    • (2003) Proc. Acm Sigcomm'03 , pp. 27-34
    • Fall, K.1
  • 5
    • 84945186803 scopus 로고    scopus 로고
    • Message ferrying: Proactive routing in highly-partitioned wireless ad hoc networks,"
    • W. Zhao and M. H. Ammar, "Message ferrying: proactive routing in highly-partitioned wireless ad hoc networks," in Proc. IEEE FTDCS'03, pp. 308-314, 2003.
    • (2003) Proc. IEEE Ftdcs'03 , pp. 308-314
    • Zhao, W.1    Ammar, M.H.2
  • 6
    • 4444277059 scopus 로고    scopus 로고
    • A message ferrying approach for data delivery in sparse mobile ad hoc networks," in
    • W. Zhao, M. Ammar, and E. Zegura, "A message ferrying approach for data delivery in sparse mobile ad hoc networks," in Proc. ACM MobiHoc'04, pp. 187-198, 2004.
    • (2004) Proc. Acm Mobihoc'04 , pp. 187-198
    • Zhao, W.1    Ammar, M.2    Zegura, E.3
  • 7
    • 78651524487 scopus 로고    scopus 로고
    • DTN based dominating set routing technique for mobile ad hoc networks
    • July
    • Hany Samuel, W. Zhuang, and B. Preiss, "DTN based dominating set routing technique for mobile ad hoc networks," in Proc. QShine '08, July 2008.
    • (2008) Proc. Qshine '08
    • Samuel, H.1    Zhuang, W.2    Preiss, B.3
  • 9
    • 43549089535 scopus 로고    scopus 로고
    • Multi-user broadcast authentication in wireless sensor networks
    • June
    • K. Ren, W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks," in Proc. IEEE SECON'07, pp. 223-232, June 2007.
    • (2007) Proc. IEEE Secon'07 , pp. 223-232
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 10
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.P.2
  • 11
    • 51349156734 scopus 로고    scopus 로고
    • ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in
    • April
    • R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. IEEE INFOCOM 2008,pp. 1229-1237, April 2008.
    • (2008) Proc. IEEE Infocom 2008 , pp. 1229-1237
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5
  • 12
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identity-based batch verification scheme for vehicular sensor networks," in
    • April
    • C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks," in Proc. IEEE INFOCOM 2008, pp. 246-250, April 2008.
    • (2008) Proc. IEEE Infocom , vol.2008 , pp. 246-250
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.-H.4    Shen, X.5
  • 13
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy-preserving protocol for vehicular communications
    • Nov.
    • X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: a secure and privacy-preserving protocol for vehicular communications," IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
    • (2007) IEEE Trans. Vehicular Technology , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 14
    • 51249100419 scopus 로고    scopus 로고
    • RAISE: An efficient rsuaided message authentication scheme in vehicular communication networks," in
    • May
    • C. Zhang, X. Lin, R. Lu, and P.-H. Ho, "RAISE: An efficient rsuaided message authentication scheme in vehicular communication networks," in Proc. IEEE ICC'08, pp. 1451-1457, May 2008.
    • (2008) Proc. IEEE Icc'08 , pp. 1451-1457
    • Zhang, C.1    Lin, X.2    Lu, R.3    Ho, P.-H.4
  • 15
    • 35448931599 scopus 로고    scopus 로고
    • Applicability of identity-based cryptography for disruption-tolerant networking," in
    • N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott, and C. Luo, "Applicability of identity-based cryptography for disruption-tolerant networking," in Proc. ACM MobiOpp'07, pp. 52-56, 2007.
    • (2007) Proc. Acm Mobiopp'07 , pp. 52-56
    • Asokan, N.1    Kostiainen, K.2    Ginzboorg, P.3    Ott, J.4    Luo, C.5
  • 16
    • 33746103748 scopus 로고    scopus 로고
    • Cross-layer design for resource allocation in 3G wireless networks and beyond
    • Dec.
    • H. Jiang, W. Zhuang, and X. Shen, "Cross-layer design for resource allocation in 3G wireless networks and beyond," IEEE Communications Magazine, vol. 43, no. 12, pp. 20-126, Dec. 2005.
    • (2005) IEEE Communications Magazine , vol.43 , Issue.12 , pp. 20-126
    • Jiang, H.1    Zhuang, W.2    Shen, X.3
  • 18
    • 0035101078 scopus 로고    scopus 로고
    • Toward self-organized mobile ad hoc networks: The terminodes project
    • Jan
    • J.-P. Hubaux, T. Gross, J.-Y. Le Boudec, and M. Vetterli, "Toward self-organized mobile ad hoc networks: the terminodes project," IEEE Communications Magazine, vol. 39, no. 1, pp. 118-124, Jan 2001.
    • (2001) IEEE Communications Magazine , vol.39 , Issue.1 , pp. 118-124
    • Hubaux, J.-P.1    Gross, T.2    le Boudec, J.-Y.3    Vetterli, M.4
  • 19
    • 37849034148 scopus 로고    scopus 로고
    • Surviving attacks on disruption-tolerant networks without authentication," in
    • J. Burgess, G. D. Bissias, M. D. Corner, and B. N. Levine, "Surviving attacks on disruption-tolerant networks without authentication," in Proc. ACM MobiHoc'07, pp. 61-70, 2007.
    • (2007) Proc. Acm Mobihoc'07 , pp. 61-70
    • Burgess, J.1    Bissias, G.D.2    Corner, M.D.3    Levine, B.N.4
  • 21
  • 22
    • 51649086444 scopus 로고    scopus 로고
    • Performance evaluation of vehicular DTN routing under realistic mobility models
    • April
    • P. Luo, H. Huang, W. Shu, M. Li, and M.-Y. Wu, "Performance evaluation of vehicular DTN routing under realistic mobility models," in Proc. IEEE WCNC 2008, pp. 2206-2211, April 2008.
    • (2008) Proc. IEEE Wcnc 2008 , pp. 2206-2211
    • Luo, P.1    Huang, H.2    Shu, W.3    Li, M.4    Wu, M.-Y.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.