메뉴 건너뛰기




Volumn 19, Issue 2, 2011, Pages 319-332

On the price of security in large-scale wireless ad hoc networks

Author keywords

Ad hoc networks; network performance; network security; wireless networks

Indexed keywords

ASYMPTOTIC BEHAVIORS; COSTS AND BENEFITS; NEIGHBORING NODES; NETWORK SIZE; PERFORMANCE DEGRADATION; RANDOM NETWORK MODELS; SECURITY ASSOCIATION; SECURITY REQUIREMENTS; TRANSMISSION RANGES; WIRELESS CHANNEL;

EID: 79955482990     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2011.2106162     Document Type: Article
Times cited : (23)

References (35)
  • 1
    • 33747142749 scopus 로고    scopus 로고
    • The capacity of wireless networks
    • Mar.
    • P. Gupta and P. R. Kumar, "The capacity of wireless networks," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 388-404
    • Gupta, P.1    Kumar, P.R.2
  • 2
    • 2942637958 scopus 로고    scopus 로고
    • A deterministic approach to throughput scaling in wireless networks
    • Jun.
    • S. Kulkarni and P. Viswanath, "A deterministic approach to throughput scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 50, no. 6, pp. 1041-1049, Jun. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.6 , pp. 1041-1049
    • Kulkarni, S.1    Viswanath, P.2
  • 3
    • 4143112460 scopus 로고    scopus 로고
    • Throughputdelay trade-off in wireless networks
    • Hong Kong, China, Mar.
    • A. E. Gamal, J. Mammen, B. Prabhakar, and D. Shah, "Throughputdelay trade-off in wireless networks," in Proc. IEEE INFOCOM , Hong Kong, China, Mar. 2004, vol. 1, pp. 464-475.
    • (2004) Proc. IEEE INFOCOM , vol.1 , pp. 464-475
    • Gamal, A.E.1    Mammen, J.2    Prabhakar, B.3    Shah, D.4
  • 4
    • 33947689700 scopus 로고    scopus 로고
    • Closing the gap in the capacity of wireless networks via percolation theory
    • DOI 10.1109/TIT.2006.890791
    • M. Franceschetti, O. Dousse, D. Tse, and P. Thiran, "Closing the gap in the capacity of wireless networks via percolation theory," IEEE Trans. Inf. Theory, vol. 53, no. 3, pp. 1009-1018, Mar. 2007. (Pubitemid 46487788)
    • (2007) IEEE Transactions on Information Theory , vol.53 , Issue.3 , pp. 1009-1018
    • Franceschetti, M.1    Dousse, O.2    Tse, D.N.C.3    Thiran, P.4
  • 5
    • 0042014445 scopus 로고    scopus 로고
    • Capacity, delay and mobility in wireless ad hoc networks
    • San Francisco, CA, Mar.
    • N. Bansal and Z. Liu, "Capacity, delay and mobility in wireless ad hoc networks," in Proc. IEEE INFOCOM, San Francisco, CA, Mar. 2003, vol. 2, pp. 1553-1563.
    • (2003) Proc. IEEE INFOCOM , vol.2 , pp. 1553-1563
    • Bansal, N.1    Liu, Z.2
  • 6
    • 77955775414 scopus 로고    scopus 로고
    • The fundamental capacity-delay tradeoff in large mobile ad hoc networks
    • Workshop, Bodrum, Turkey, Jun.
    • X. Lin and N. B. Shroff, "The fundamental capacity-delay tradeoff in large mobile ad hoc networks," presented at the 3rd Annu. Mediterr. Ad Hoc Netw. Workshop, Bodrum, Turkey, Jun. 2004.
    • (2004) 3rd Annu. Mediterr. Ad Hoc Netw.
    • Lin, X.1    Shroff, N.B.2
  • 7
    • 33745136745 scopus 로고    scopus 로고
    • Degenerate delay-capacity tradeoffs in Ad-Hoc networks with Brownian mobility
    • DOI 10.1109/TIT.2006.874544
    • X. Lin, G. Sharma, R. Mazumdar, and N. Shroff, "Degenerate delay-capacity trade-offs in ad hoc networks with brownian mobility," IEEE/ACM Trans. Netw., vol. 52, no. 3, pp. 2777-2784, Jun. 2006. (Pubitemid 43898925)
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.6 , pp. 2777-2784
    • Lin, X.1    Sharma, G.2    Mazumdar, R.R.3    Shroff, N.B.4
  • 8
    • 2442421542 scopus 로고    scopus 로고
    • Large wireless networks under fading, mobility, and delay constraints
    • Hong Kong, China, Mar.
    • S. Toumpis and A. Goldsmith, "Large wireless networks under fading, mobility, and delay constraints," in Proc. IEEE INFOCOM, Hong Kong, China, Mar. 2004, vol. 1, pp. 609-619.
    • (2004) Proc. IEEE INFOCOM , vol.1 , pp. 609-619
    • Toumpis, S.1    Goldsmith, A.2
  • 9
    • 33745165887 scopus 로고    scopus 로고
    • Optimal throughput-delay scaling in wireless networks - Part I: The fluid model
    • DOI 10.1109/TIT.2006.874379
    • A. E. Gamal, J. Mammen, B. Prabhakar, and D. Shah, "Optimal throughput-delay scaling in wireless networks-Part I: The fluid model," IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2568-2592, Jun. 2006. (Pubitemid 43898909)
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.6 , pp. 2568-2592
    • El Gamal, A.1    Mammen, J.2    Prabhakar, B.3    Shah, D.4
  • 10
    • 33750576199 scopus 로고    scopus 로고
    • Optimal throughput-delay scaling in wireless networks - Part II: Constant-size packets
    • DOI 10.1109/TIT.2006.883548
    • A. E. Gamal, J. Mammen, B. Prabhakar, and D. Shah, "Optimal throughput-delay scaling in wireless networks-Part II: Constant-size packets," IEEE Trans. Inf. Theory, vol. 52, no. 11, pp. 5111-5116, Nov. 2006. (Pubitemid 44680597)
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.11 , pp. 5111-5116
    • El Gamal, A.1    Mammen, J.2    Prabhakar, B.3    Shah, D.4
  • 11
    • 39049148855 scopus 로고    scopus 로고
    • Delay and capacity trade-offs in mobile ad hoc networks: A global perspective
    • Barcelona, Spain, Apr.
    • G. Sharma, R. R. Mazumdar, and N. B. Shroff, "Delay and capacity trade-offs in mobile ad hoc networks: A global perspective," in Proc. IEEE INFOCOM, Barcelona, Spain, Apr. 2006, pp. 1-12.
    • (2006) Proc. IEEE INFOCOM , pp. 1-12
    • Sharma, G.1    Mazumdar, R.R.2    Shroff, N.B.3
  • 12
    • 20544449224 scopus 로고    scopus 로고
    • Capacity and delay tradeoffs for ad hoc mobile networks
    • DOI 10.1109/TIT.2005.847717
    • M. Neely and E. Modiano, "Capacity and delay tradeoffs for ad-hoc mobile networks," IEEE Trans. Inf. Theory, vol. 51, no. 6, pp. 1917-1937, Jun. 2005. (Pubitemid 40843617)
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.6 , pp. 1917-1937
    • Neely, M.J.1    Modiano, E.2
  • 13
    • 33751529199 scopus 로고    scopus 로고
    • Securing mobile ad hoc networks with certificateless public keys
    • DOI 10.1109/TDSC.2006.58
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Trans. Depend. Secure Comput., vol. 3, no. 4, pp. 386-399, Oct.-Dec. 2006. (Pubitemid 44837040)
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.4 , pp. 386-399
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 14
    • 51349107952 scopus 로고    scopus 로고
    • Modeling secure connectivity of selforganized wireless ad hoc networks
    • Phoenix, AZ, Apr.
    • C. Zhang, Y. Song, and Y. Fang, "Modeling secure connectivity of selforganized wireless ad hoc networks," in Proc. INFOCOM, Phoenix, AZ, Apr. 2008, pp. 251-255.
    • (2008) Proc. INFOCOM , pp. 251-255
    • Zhang, C.1    Song, Y.2    Fang, Y.3
  • 15
    • 51049085143 scopus 로고    scopus 로고
    • Secure capacity of multi-hop wireless networks with random key pre-distribution
    • Phoenix, AZ, Apr.
    • V. Bhandari and N.Vaidya, "Secure capacity of multi-hop wireless networks with random key pre-distribution," in Proc. 2nd IEEE Workshop Mission-Critical Netw., Phoenix, AZ, Apr. 2008, pp. 1-6.
    • (2008) Proc. 2nd IEEE Workshop Mission-Critical Netw. , pp. 1-6
    • Bhandari, V.1    Vaidya, N.2
  • 16
    • 3142519532 scopus 로고    scopus 로고
    • On trust establishment in mobile ad-hoc networks
    • Cambridge, U.K., Apr.
    • L. Eschenauer, V. Gligor, and J. Baras, "On trust establishment in mobile ad-hoc networks," in Proc. Security Protocols Workshop, Cambridge, U.K., Apr. 2002, pp. 47-66.
    • (2002) Proc. Security Protocols Workshop , pp. 47-66
    • Eschenauer, L.1    Gligor, V.2    Baras, J.3
  • 17
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • Washingtion, DC, Nov.
    • L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in Proc. ACM CCS,Washingtion, DC, Nov. 2002, pp. 41-47.
    • (2002) Proc. ACM CCS , pp. 41-47
    • Eschenauer, L.1    Gligor, V.2
  • 18
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Berkeley, CA, May
    • H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE S& P, Berkeley, CA, May 2003, pp. 197-213.
    • (2003) Proc. IEEE S& P , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 19
    • 0035789229 scopus 로고    scopus 로고
    • The quest for security in mobile ad hoc networks
    • Long Beach, CA, Oct.
    • J. Hubaux, L. Buttyan, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proc. ACMMobiHoc, Long Beach, CA, Oct. 2001, pp. 146-155.
    • (2001) Proc. ACMMobiHoc , pp. 146-155
    • Hubaux, J.1    Buttyan, L.2    Capkun, S.3
  • 20
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Jan.
    • S. Capkun, L. Buttyan, and J. Hubaux, "Self-organized public-key management for mobile ad hoc networks," IEEE Trans. Mobile Comput., vol. 2, no. 1, pp. 52-64, Jan. 2003.
    • (2003) IEEE Trans. Mobile Comput. , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.3
  • 23
    • 34548391593 scopus 로고    scopus 로고
    • Modeling pairwise key establishment for random key predistribution in large-scale sensor networks
    • DOI 10.1109/TNET.2007.896259
    • D. Huang, M. Mehta, A. van de Liefvoort, and D. Medhi, "Modeling pairwise key establishment for random key predistribution in largescale sensor networks," IEEE/ACM Trans. Netw., vol. 15, no. 5, pp. 1204-1215, Oct. 2007. (Pubitemid 350111563)
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.5 , pp. 1204-1215
    • Huang, D.1    Mehta, M.2    Van De Liefvoort, A.3    Medhi, D.4
  • 24
    • 37849033249 scopus 로고    scopus 로고
    • Capacity of multi-channel wireless networks with random (c,f) assignment
    • Montreal, QC, Canada, Sep.
    • V. Bhandari and N. Vaidya, "Capacity of multi-channel wireless networks with random (c,f) assignment," in Proc. ACM MobiHoc,Montreal, QC, Canada, Sep. 2007, pp. 229-238.
    • (2007) Proc. ACM MobiHoc , pp. 229-238
    • Bhandari, V.1    Vaidya, N.2
  • 27
    • 25644456139 scopus 로고    scopus 로고
    • Information theoretic bounds on the throughput scaling of wireless relay networks
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • O. Dousse, M. Franceschetti, and P. Thiran, "Information theoretic bounds on the throughput scaling of wireless relay networks," in Proc. IEEE INFOCOM, Miami, FL, Mar. 2005, vol. 4, pp. 2670-2678. (Pubitemid 41382380)
    • (2005) Proceedings - IEEE INFOCOM , vol.4 , pp. 2670-2678
    • Dousse, O.1    Franceschetti, M.2    Thiran, P.3
  • 28
    • 85029421552 scopus 로고
    • Block gossiping on grids and tori: Deterministic sorting and routing match the bisection bound
    • Honnef, Germany, Sep.
    • M. Kunde, "Block gossiping on grids and tori: Deterministic sorting and routing match the bisection bound," in Proc. 1st Eur. Symp. Algor., Honnef, Germany, Sep. 1993, pp. 272-283.
    • (1993) Proc. 1st Eur. Symp. Algor. , pp. 272-283
    • Kunde, M.1
  • 29
    • 0028263307 scopus 로고
    • Derandomizing algorithms for routing and sorting on meshes
    • Arlington, VA, Jan.
    • M. Kaufmann, J. F. Sibeyn, and T. Suel, "Derandomizing algorithms for routing and sorting on meshes," in Proc. 5th ACM-SIAM SODA, Arlington, VA, Jan. 1994, pp. 669-679.
    • (1994) Proc. 5th ACM-SIAM SODA , pp. 669-679
    • Kaufmann, M.1    Sibeyn, J.F.2    Suel, T.3
  • 30
    • 85031727532 scopus 로고
    • Percolation theory and computing with faulty arrays of processors
    • Orlando, FL, Jan.
    • T. R. Mathies, "Percolation theory and computing with faulty arrays of processors," in Proc. 3rd ACM-SIAM SODA, Orlando, FL, Jan. 1992, pp. 100-103.
    • (1992) Proc. 3rd ACM-SIAM SODA , pp. 100-103
    • Mathies, T.R.1
  • 32
    • 0025383763 scopus 로고
    • A guided tour of Chernoff bounds
    • Feb.
    • T. Hagerup and C. Rüb, "A guided tour of Chernoff bounds," Inf. Process. Lett., vol. 33, no. 6, pp. 305-308, Feb. 1990.
    • (1990) Inf. Process. Lett. , vol.33 , Issue.6 , pp. 305-308
    • Hagerup, T.1    Rüb, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.