메뉴 건너뛰기




Volumn 10, Issue 5, 2011, Pages 653-668

Secure high-throughput multicast routing in wireless mesh networks

Author keywords

Byzantine attacks.; high throughput metrics; metric manipulation attacks; secure multicast routing; Wireless mesh networks

Indexed keywords

ADVERSARIAL NETWORKS; BYZANTINE ATTACKS.; COMPROMISED NODES; DATA-FORWARDING; DEFENSE MECHANISM; HIGH-THROUGHPUT; HIGH-THROUGHPUT METRICS; LINK QUALITY; LOCAL ESTIMATION; MAXIMIZE THROUGHPUT; MEASUREMENT-BASED; METRIC MANIPULATION ATTACKS; MULTICAST PROTOCOL; MULTICAST ROUTING; MULTICAST SETTINGS; PATH METRIC; PATH SELECTION; SECURE MULTICASTS; SECURITY ANALYSIS; TRANSIENT NETWORK; UNICAST;

EID: 79952931949     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2010.194     Document Type: Article
Times cited : (32)

References (47)
  • 2
    • 0036924859 scopus 로고    scopus 로고
    • Flooding-based geocasting protocols for mobile ad hoc networks
    • Y.B. Ko and N.H. Vaidya, "Flooding-Based Geocasting Protocols for Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 7, no. 6, pp. 471-480, 2002.
    • (2002) Mobile Networks and Applications , vol.7 , Issue.6 , pp. 471-480
    • Ko, Y.B.1    Vaidya, N.H.2
  • 5
    • 0035268368 scopus 로고    scopus 로고
    • Scalable multicasting: The core-assisted mesh protocol
    • DOI 10.1023/A:1011400407314
    • E.L. Madruga and J.J. Garcia-Luna-Aceves, "Scalable Multicasting: the Core-Assisted Mesh Protocol," Mobile Networks and Applications, vol. 6, no. 2, pp. 151-165, 2001. (Pubitemid 32512260)
    • (2001) Mobile Networks and Applications , vol.6 , Issue.2 , pp. 151-165
    • Madruga, E.L.1    Garcia-Luna-Aceves, J.J.2
  • 6
    • 0036924499 scopus 로고    scopus 로고
    • On-demand multicast routing protocol in multihop wireless mobile networks
    • S.J. Lee, W. Su, and M. Gerla, "On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks," Mobile Networks and Applications, vol. 7, no. 6, pp. 441-453, 2002.
    • (2002) Mobile Networks and Applications , vol.7 , Issue.6 , pp. 441-453
    • Lee, S.J.1    Su, W.2    Gerla, M.3
  • 7
    • 11144257116 scopus 로고    scopus 로고
    • Multicast ad-hoc on-demand distance vector (maodv) routing
    • July
    • E.M. Royer and C.E. Perkins, "Multicast Ad-Hoc On-Demand Distance Vector (MAODV) Routing," Internet Draft, July 2000.
    • (2000) Internet Draft
    • Royer, E.M.1    Perkins, C.E.2
  • 8
    • 0035789901 scopus 로고    scopus 로고
    • Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks
    • J.G. Jetcheva and D.B. Johnson, "Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks," Proc. ACM MobiHoc, 2001.
    • (2001) Proc. ACM MobiHoc
    • Jetcheva, J.G.1    Johnson, D.B.2
  • 15
    • 0002529141 scopus 로고
    • A control-theoretic approach to flow control
    • S. Keshav, "A Control-Theoretic Approach to Flow Control," Proc. ACM SIGCOMM, 1993.
    • (1993) Proc. ACM SIGCOMM
    • Keshav, S.1
  • 16
    • 11244335412 scopus 로고    scopus 로고
    • Routing in multi-radio, multi-hop wireless mesh networks
    • R. Draves, J. Padhye, and B. Zill, "Routing in Multi-Radio, Multi-Hop Wireless Mesh Networks," Proc. ACM MobiCom, 2004.
    • (2004) Proc. ACM MobiCom
    • Draves, R.1    Padhye, J.2    Zill, B.3
  • 20
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Aug
    • S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, Aug. 2000.
    • (2000) Proc. ACM MobiCom
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 22
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y.-C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure on-Demand Routing Protocol for Ad Hoc Networks," Proc. ACM MobiCom, 2002.
    • (2002) Proc. ACM MobiCom
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 26
    • 60949084324 scopus 로고    scopus 로고
    • Bsmr: Byzantine-resilient secure multicast routing in multi-hop wireless networks
    • Apr.
    • R. Curtmola and C. Nita-Rotaru, "BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-Hop Wireless Networks," IEEE Trans. Mobile Computing, vol. 8, no. 4, pp. 445-459, Apr. 2009.
    • (2009) IEEE Trans. Mobile Computing , vol.8 , Issue.4 , pp. 445-459
    • Curtmola, R.1    Nita-Rotaru, C.2
  • 27
    • 13844302260 scopus 로고    scopus 로고
    • Comparison of routing metrics for static multi-hop wireless networks
    • R. Draves, J. Padhye, and B. Zill, "Comparison of Routing Metrics for Static Multi-Hop Wireless Networks," Proc. ACM SIGCOMM, 2004.
    • (2004) Proc. ACM SIGCOMM
    • Draves, R.1    Padhye, J.2    Zill, B.3
  • 28
    • 44149122830 scopus 로고    scopus 로고
    • High-throughput multicast routing metrics in wireless mesh networks
    • S. Roy, D. Koutsonikolas, S. Das, and C. Hu, "High-Throughput Multicast Routing Metrics in Wireless Mesh Networks," Ad Hoc Networks, vol. 6, no. 6, pp. 878-899, 2007.
    • (2007) Ad Hoc Networks , vol.6 , Issue.6 , pp. 878-899
    • Roy, S.1    Koutsonikolas, D.2    Das, S.3    Hu, C.4
  • 29
    • 34548493227 scopus 로고    scopus 로고
    • On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks : AAAAn integrated approach using game theoretic and cryptographic techniques
    • DOI 10.1007/s11276-006-9855-1, Special Issue: Selected Papers on MOBICOM 2005
    • S. Zhong, L.E. Li, Y.G. Liu, and Y.R. Yang, "On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks: An Integrated Approach Using Game Theoretic and Cryptographic Techniques," Wireless Networks, vol. 13, no. 6, pp. 799-816, 2007. (Pubitemid 47373423)
    • (2007) Wireless Networks , vol.13 , Issue.6 , pp. 799-816
    • Zhong, S.1    Li, L.E.2    Liu, Y.G.3    Yang, Y.R.4
  • 30
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, 2003.
    • (2003) Mobile Networks and Applications , vol.8 , Issue.5 , pp. 579-592
    • Buttyan, L.1    Hubaux, J.-P.2
  • 31
    • 0020128340 scopus 로고
    • Theory of spread-spectrum communications-a tutorial
    • May
    • R. Pickholtz, D. Schilling, and L. Milstein, "Theory of Spread-Spectrum Communications-A Tutorial," IEEE Trans. Comm., vol. 30, no. 5, pp. 855-884, May 1982.
    • (1982) IEEE Trans. Comm. , vol.30 , Issue.5 , pp. 855-884
    • Pickholtz, R.1    Schilling, D.2    Milstein, L.3
  • 32
    • 0002431508 scopus 로고
    • The aloha system-another alternative for computer communications
    • N. Abramson, "The Aloha System-Another Alternative for Computer Communications," Proc. AFIPS Fall Joint Computer Conf., 1970.
    • (1970) Proc. AFIPS Fall Joint Computer Conf.
    • Abramson, N.1
  • 35
    • 22944432884 scopus 로고    scopus 로고
    • Contention-aware admission control for ad hoc networks
    • DOI 10.1109/TMC.2005.52
    • Y. Yang and R. Kravets, "Contention-Aware Admission Control for Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 363-377, July/Aug. 2005. (Pubitemid 41049893)
    • (2005) IEEE Transactions on Mobile Computing , vol.4 , Issue.4 , pp. 363-377
    • Yang, Y.1    Kravets, R.2
  • 37
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defenseagainst wormhole attacks in wireless ad hoc networks
    • Y.-C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A DefenseAgainst Wormhole Attacks in Wireless Ad Hoc Networks," Proc.IEEE INFOCOM, 2003.
    • (2003) Proc. IEEE INFOCOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 47
    • 50649121289 scopus 로고    scopus 로고
    • A dynamic secure qos routing protocol forwireless ad hoc networks
    • T. Zhu and M. Yu, "A Dynamic Secure QoS Routing Protocol forWireless Ad Hoc Networks," Proc. IEEE Sarnoff Symp., 2006.
    • (2006) Proc. IEEE Sarnoff Symp.
    • Zhu, T.1    Yu, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.