메뉴 건너뛰기




Volumn , Issue , 2011, Pages 850-854

A light weight security scheme for HWMP protocol using elliptic curve technique

Author keywords

ECDSA; HWMP; Mesh; Routing Protocols; Security

Indexed keywords

CONTROL MESSAGES; CONTROL PACKETS; ECDSA; ELLIPTIC CURVE; ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM; HWMP; LIGHT WEIGHT; MESH; SECURITY; SECURITY SCHEME; WIRELESS MESH;

EID: 84856185933     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2011.6115561     Document Type: Conference Paper
Times cited : (7)

References (28)
  • 2
    • 77249166094 scopus 로고    scopus 로고
    • A Survey on Security in Wireless Mesh Networks
    • February 18
    • Ping Yi, Yue Wu, Futai Zou and Ning Liu. "A Survey on Security in Wireless Mesh Networks". IETE, February 18, 2010.
    • (2010) IETE
    • Yi, P.1    Wu, Y.2    Zou, F.3    Liu, N.4
  • 3
    • 80052169081 scopus 로고    scopus 로고
    • Departament of Information Research, Zhengzhou, Information Science and Tecnology Institutem Zhengzhou, P.R. China, February 18
    • L. Guangsong, "An Identity-Based Security Architecture for Wireless Mesh Network", Departament of Information Research, Zhengzhou, Information Science and Tecnology Institutem Zhengzhou, P.R. China, February 18, 2010.
    • (2010) An Identity-Based Security Architecture for Wireless Mesh Network
    • Guangsong, L.1
  • 5
    • 80052158114 scopus 로고    scopus 로고
    • Department of Computer Engineering, Kyung Hee University, Republic of Korea, Departament of Information and Comunications Engineering, Hankuk University of Foreign Studies, Republic of Korea. Springer-Verlag Berling Heidelberg
    • Md. Shariful Islam, Md Abdul Hamid, and Choong Seon Hong, "SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Network", Department of Computer Engineering, Kyung Hee University, Republic of Korea, Departament of Information and Comunications Engineering, Hankuk University of Foreign Studies, Republic of Korea. Springer-Verlag Berling Heidelberg 2009.
    • (2009) SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Network
    • Islam, Md.S.1    Hamid, M.A.2    Hong, C.S.3
  • 6
    • 85020598353 scopus 로고
    • Identity based Cryptosystems and Signature Schemes
    • A. Shamir. Identity based Cryptosystems and Signature Schemes. Crypto'84. pp.47-53, 1984.
    • (1984) Crypto'84 , pp. 47-53
    • Shamir, A.1
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identify based Encryption from the Weil Pairing
    • Boneh and Franklin. Identify based Encryption from The Weil Pairing. Crypto'01, pp. 213- 219, 2001.
    • (2001) Crypto'01 , pp. 213-219
    • Boneh1    Franklin2
  • 11
    • 79953067606 scopus 로고    scopus 로고
    • Secure Hash Standard (SHS)
    • U.S. Department of Commerce, National Institute of Standards and Technology
    • U.S. Department of Commerce, National Institute of Standards and Technology. Secure Hash Standard (SHS) (Federal Information Processing Standards Publication 180-3), 2008.
    • (2008) Federal Information Processing Standards Publication 180-3
  • 12
    • 85031307530 scopus 로고
    • Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers
    • August 1 revised version of the paper is available from
    • Charles E. Perkins and Pravin Bhagwat. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In Proceedings of the SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications, pages 234-244, August 1994. 1 revised version of the paper is available from http://www.es.umd.edu/projects/mcml/papers/Sigcomm94. ps.
    • (1994) Proceedings of the SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications , pp. 234-244
    • Perkins, C.E.1    Bhagwat, P.2
  • 16
    • 80054065099 scopus 로고    scopus 로고
    • Secure Routing for Wireless Mesh Networks
    • Sept.
    • Celia Li, Zhuang Wang, and Cungang Yang. Secure Routing for Wireless Mesh Networks. International Journal of Network Security, Vol. 13, No. 2, PP.109, Sept. 2011.
    • (2011) International Journal of Network Security , vol.13 , Issue.2 , pp. 109
    • Li, C.1    Wang, Z.2    Yang, C.3
  • 18
    • 0012497782 scopus 로고    scopus 로고
    • Elliptic Curves and Cryptography
    • April
    • Juriscic and Menezes. "Elliptic Curves and Cryptography". Dr. Dobbs Journal, No. 264, April 1997.
    • (1997) Dr. Dobbs Journal , Issue.264
    • Juriscic1    Menezes2
  • 21
    • 84856153829 scopus 로고    scopus 로고
    • A security solution for IEEE 802.11 ad hoc mode: Password-authentication and group DiffieHellman key exchange
    • Emmanuel Bresson, Olivier Chevassut, David Pointcheval."A security solution for IEEE 802.11 ad hoc mode: password-authentication and group DiffieHellman key exchange". Int. J. Wireless and Mobile Computing, Vol. 2, No. 1. 2007.
    • (2007) Int. J. Wireless and Mobile Computing , vol.2 , Issue.1
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 24
    • 84856152028 scopus 로고    scopus 로고
    • FIPS PUB 186-3. Federal Information Processing Standards Publication. Information Technology Laboratory. National Institute of Standards and Technology. Gaithersburg, MD 20899-8900. Issued June
    • FIPS PUB 186-3. Federal Information Processing Standards Publication. Digital Signature Standard (DSS) Category: Computer Security Subcategory: Cryptography. Information Technology Laboratory. National Institute of Standards and Technology. Gaithersburg, MD 20899-8900. Issued June, 2009.
    • (2009) Digital Signature Standard (DSS) Category: Computer Security Subcategory: Cryptography


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.