메뉴 건너뛰기




Volumn 11, Issue 2, 2011, Pages 196-210

Security mechanism for voice over multipath mobile ad hoc networks

Author keywords

mobile ad hoc network; multipath routing; security; traffic allocation

Indexed keywords

CRITICAL ISSUES; MOBILE NODES; MOBILE USERS; MULTI-PATH; MULTIPATH ROUTING; PERFORMANCE EVALUATION; PERFORMANCE METRICS; REAL TIME TRAFFICS; SECURITY; SECURITY ANALYSIS; SECURITY MECHANISM; SIMULATION EXPERIMENTS; TRAFFIC ALLOCATION; VARIOUS ATTACKS; VOICE COMMUNICATION; VOICE OVER IP; VOICE TRANSMISSIONS; WIRELESS COMMUNICATION SYSTEM; WIRELESS LINK;

EID: 79951989464     PISSN: 15308669     EISSN: 15308677     Source Type: Journal    
DOI: 10.1002/wcm.948     Document Type: Article
Times cited : (8)

References (30)
  • 4
    • 13444280292 scopus 로고    scopus 로고
    • Solutions to performance problems in VoIP over a 802.11 wireless LAN
    • DOI 10.1109/TVT.2004.838890
    • Wang W, Liew SC, Li VOK,. Solutions to performance problems in VoIP over a 802.11 wireless LAN. IEEE Transactions on Vehicular Technology 2005; 54: 366-384. (Pubitemid 40211114)
    • (2005) IEEE Transactions on Vehicular Technology , vol.54 , Issue.1 , pp. 366-384
    • Wang, W.1    Liew, S.C.2    Li, V.O.K.3
  • 9
    • 7744233199 scopus 로고    scopus 로고
    • A routing framework for providing robustness to node failures in mobile ad hoc networks
    • Ye Z, Krishnamurthy SV, Tripathi SK,. A routing framework for providing robustness to node failures in mobile ad hoc networks. Elsevier Ad hoc Networks Journal 2004; 2 (1): 87-107.
    • (2004) Elsevier Ad Hoc Networks Journal , vol.2 , Issue.1 , pp. 87-107
    • Ye, Z.1    Krishnamurthy, S.V.2    Tripathi, S.K.3
  • 10
    • 27744454844 scopus 로고    scopus 로고
    • Multipath video transport over ad hoc networks
    • DOI 10.1109/MWC.2005.1497857, Advances in Wireless Video
    • Mao S, Lin S, Wang Y, Panwar SS, Li Y,. Multipath video transport over ad hoc networks. IEEE Wireless Communications 2005; 12 (4): 42-49. (Pubitemid 41595368)
    • (2005) IEEE Wireless Communications , vol.12 , Issue.4 , pp. 42-49
    • Mao, S.1    Lin, S.2    Wang, Y.3    Panwar, S.S.4    Li, Y.5
  • 11
    • 11244275670 scopus 로고    scopus 로고
    • Robust multipath source routing protocol (RMPSR) for video communication over wireless ad hoc networks (ICME04), Taipei, Taiwan, June
    • Wei W, Zakhor A,. Robust multipath source routing protocol (RMPSR) for video communication over wireless ad hoc networks. In Proceedings of IEEE International Conference on Multimedia and Expo, (ICME04), Taipei, Taiwan, June 2004; 2: 1379-1382.
    • (2004) Proceedings of IEEE International Conference on Multimedia and Expo , vol.2 , pp. 1379-1382
    • Wei, W.1    Zakhor, A.2
  • 12
    • 34250202194 scopus 로고    scopus 로고
    • Transmission of layered video streaming via multi-path on ad hoc networks
    • Hsieh MY, Huang YM, Chiang TC,. Transmission of layered video streaming via multi-path on ad hoc networks. Springer Multimedia Tools Applications 2007; 34 (2): 155-177.
    • (2007) Springer Multimedia Tools Applications , vol.34 , Issue.2 , pp. 155-177
    • Hsieh, M.Y.1    Huang, Y.M.2    Chiang, T.C.3
  • 13
    • 33750029995 scopus 로고    scopus 로고
    • SecMR - A secure multipath routing protocol for ad hoc networks
    • DOI 10.1016/j.adhoc.2006.05.020, PII S1570870506000515, Security Issues in Sensor and Ad Hoc Networks
    • Mavropodi R, Kotzanikolaoua P, Douligerisa C,. SecMRa a secure multipath routing protocol for ad hoc networks. Elsevier Ad hoc Networks 2007; 5 (1): 87-99. (Pubitemid 44573009)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 87-99
    • Mavropodi, R.1    Kotzanikolaou, P.2    Douligeris, C.3
  • 14
    • 38649120863 scopus 로고    scopus 로고
    • Secure, Disjoint, Multipath Source Routing Protocol(SDMSR) for Mobile Ad-hoc Networks
    • DOI 10.1109/GCC.2006.86, 4031486, Proceedings - Fifth International Conference on Grid and Cooperative Computing, GCC 2006
    • Berton S, Yin H, Lin C, Min G,. Secure, disjoint, multipath source routing protocol(SDMSR) for mobile ad hoc networks. In Proceedings of the Fifth International Conference on Grid and Cooperative Computing (GCC06), Changsha, Hunan, China, 2006; 387-394. (Pubitemid 351165010)
    • (2006) Proceedings - Fifth International Conference on Grid and Cooperative Computing, GCC 2006 , pp. 387-394
    • Berton, S.1    Yin, H.2    Lin, C.3    Min, G.4
  • 15
    • 60049091288 scopus 로고    scopus 로고
    • SPREAD: Improving network security by multipath routing in mobile ad hoc networks
    • Lou W, Liu W, Zhang Y, Fang Y,. SPREAD: improving network security by multipath routing in mobile ad hoc networks. Springers Wireless Networks 2009; 15 (3): 279-294.
    • (2009) Springers Wireless Networks , vol.15 , Issue.3 , pp. 279-294
    • Lou, W.1    Liu, W.2    Zhang, Y.3    Fang, Y.4
  • 17
    • 33144467802 scopus 로고    scopus 로고
    • Secure data communication in mobile ad hoc networks
    • DOI 10.1109/JSAC.2005.861392
    • Papadimitratos P, Haas ZJ,. Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications 2006; 24 (2): 343-356. (Pubitemid 43269754)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 343-356
    • Papadimitratos, P.1    Haas, Z.J.2
  • 20
    • 33751409131 scopus 로고    scopus 로고
    • SMORT: Scalable multipath on-demand routing for mobile ad hoc networks
    • DOI 10.1016/j.adhoc.2005.10.002, PII S1570870505000983
    • Reddy LR, Raghavan SV,. SMORT: Scalable multipath on-demand routing for mobile ad hoc networks. Elsevier Ad hoc Networks 2007; 5 (2): 162-188. (Pubitemid 44821020)
    • (2007) Ad Hoc Networks , vol.5 , Issue.2 , pp. 162-188
    • Reddeppa Reddy, L.1    Raghavan, S.V.2
  • 22
    • 0025023289 scopus 로고
    • Reasoning about belief in cryptographic protocols
    • 1990 IEEE Comput Soc Symp Res Secur Privacy
    • Gong L, Needham R, Yahalom R,. Reasoning about belief in cryptographic protocols. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, USA, 1990; 234-248. (Pubitemid 20739291)
    • (1990) Proceedings of the Symposium on Security and Privacy , pp. 234-248
    • Gong, L.1    Needham, R.2    Yahalom, R.3
  • 24
    • 13244276488 scopus 로고    scopus 로고
    • Secure routing in mobile wireless ad hoc networks
    • DOI 10.1016/S1570-8705(03)00017-9
    • Gupte S, Singhal M,. Secure routing in mobile wireless ad hoc networks. Elsevier Ad hoc Networks 2003; 1 (1): 151-174. (Pubitemid 40421400)
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 151-174
    • Gupte, S.1    Singhal, M.2
  • 26
    • 85029731561 scopus 로고    scopus 로고
    • A survey of attacks and countermeasures in mobile ad hoc networks
    • In, Xiao Y., Shen X., Du D-Z (eds). Springer: New York, NY, USA.
    • Wu B, Chen J, Wu J, Cardei M,. A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless Network Security, Xiao Y, Shen X, Du D-Z, (eds). Springer: New York, NY, USA, 2007; 103-135.
    • (2007) Wireless Network Security , pp. 103-135
    • Wu, B.1    Chen, J.2    Wu, J.3    Cardei, M.4
  • 28
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • Hu Y, Perrig A,. A survey of secure wireless ad hoc routing. IEEE Security & Privacy 2004; 2 (3): 28-39.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.1    Perrig, A.2
  • 30
    • 79951994579 scopus 로고    scopus 로고
    • OPNET Modeler Simulation Software
    • OPNET Modeler Simulation Software


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.