메뉴 건너뛰기




Volumn 13, Issue 2, 2011, Pages 109-120

Secure routing for wireless mesh networks

Author keywords

AODV; Hop by hop authentication; MAC; Wireless mesh networks

Indexed keywords

AODV; AODV ROUTING; AODV ROUTING PROTOCOL; BROADCAST ROUTING; COMPUTATION COSTS; HELLO MESSAGE; HOP BY HOP; KEY PRE-DISTRIBUTION; MAC; MESSAGE AUTHENTICATION CODES; ONE-HOP NEIGHBORS; PERFORMANCE EVALUATION; ROUTING ATTACKS; SECURE ROUTING; SECURITY ANALYSIS; UNICAST;

EID: 80054065099     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (43)

References (23)
  • 1
    • 13844296355 scopus 로고    scopus 로고
    • Wireless mesh networks: A survey
    • I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: A survey," Computer Networks, vol. 47, no. 4, pp. 445-487, 2005.
    • (2005) Computer Networks , vol.47 , Issue.4 , pp. 445-487
    • Akyildiz, I.F.1    Wang, X.2    Wang, W.3
  • 4
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • LNCS 209
    • R. Blom, "An optimal class of symmetric key generation systems," Proceedings of Eurocrypt'84, LNCS 209, pp. 335-338, 1985.
    • (1985) Proceedings of Eurocrypt'84 , pp. 335-338
    • Blom, R.1
  • 6
    • 17744372294 scopus 로고    scopus 로고
    • Mesh networks: Commodity multihop ad hoc networks
    • R. Bruno, M. Conti, and E. Gregori, "Mesh networks: Commodity multihop ad hoc networks," IEEE Communications Magazine, vol. 43, pp. 123-131, 2005.
    • (2005) IEEE Communications Magazine , vol.43 , pp. 123-131
    • Bruno, R.1    Conti, M.2    Gregori, E.3
  • 7
    • 11244335412 scopus 로고    scopus 로고
    • Routing in multiradio, multihop wireless mesh networks
    • R. Draves, J. Padhye, and B. Zill, "Routing in multiradio, multihop wireless mesh networks," Proceedings of ACM Mobicom, pp. 114-128, 2004.
    • (2004) Proceedings of ACM Mobicom , pp. 114-128
    • Draves, R.1    Padhye, J.2    Zill, B.3
  • 9
    • 85008543309 scopus 로고    scopus 로고
    • Provably secure ondemand routing in mobile adhoc networks
    • L. B. Gergely and I. Vajda, "Provably secure ondemand routing in mobile adhoc networks," IEEE Transactions on Mobile Computing, vol. 5, no. 11, pp. 1533-1546, 2006.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.11 , pp. 1533-1546
    • Gergely, L.B.1    Vajda, I.2
  • 10
    • 0035790166 scopus 로고    scopus 로고
    • Routing with load balancing in wireless Ad hoc networks
    • H. Hassanein and A. Zhou, "Routing with load balancing in wireless Ad hoc networks," Proceedings of ACM MSWiM, pp. 89-96, 2001.
    • (2001) Proceedings of ACM MSWiM , pp. 89-96
    • Hassanein, H.1    Zhou, A.2
  • 11
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Atlanta, GA, Sep
    • Y C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," Proceedings of MobiCom, pp. 21-38, Atlanta, GA, Sep. 2002.
    • (2002) Proceedings of MobiCom , pp. 21-38
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 12
    • 54249087948 scopus 로고    scopus 로고
    • 2008 A secure hybrid wireless mesh protocol for 802.11s mesh network
    • LNCS 5072
    • M. S. Islam, Y. J. Yoon, M. A. Hamid, and C. S. Hong, "A secure hybrid wireless mesh protocol for 802.11s mesh network," Proceedings of ICCSA 2008, LNCS 5072, pp. 972V985, 2008.
    • (2008) Proceedings of ICCSA
    • Islam, M.S.1    Yoon, Y.J.2    Hamid, M.A.3    Hong, C.S.4
  • 15
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in Ad hoc wireless networks
    • D. B. Johnson and D. A Maltz, "Dynamic source routing in Ad hoc wireless networks," Mobile Computing, vol. 353, pp. 153-181, 1996.
    • (1996) Mobile Computing , vol.353 , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 16
    • 32144462651 scopus 로고    scopus 로고
    • Experimental comparisons between SAODV and AODV routing protocols
    • Oct
    • Y. Lin, A. H.M. Rad, V.W. S.Wong, and J. H. Song, "Experimental comparisons between SAODV and AODV routing protocols," Proceedings of WMuNeP, pp. 113-122, Oct. 2005.
    • (2005) Proceedings of WMuNeP , pp. 113-122
    • Lin, Y.1    Rad, A.H.M.2    Wong, V.W.S.3    Song, J.H.4
  • 17
    • 33645695288 scopus 로고    scopus 로고
    • Energy-efficient and intrusionresilient authentication for ubiquitous access to factory floor information
    • Feb
    • M. Long and J. Wu, "Energy-efficient and intrusionresilient authentication for ubiquitous access to factory floor information," IEEE Transactions on Industrial Informatics, vol. 2, pp. 40-47, Feb. 2006.
    • (2006) IEEE Transactions on Industrial Informatics , vol.2 , pp. 40-47
    • Long, M.1    Wu, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.