메뉴 건너뛰기




Volumn 14, Issue 3, 2012, Pages 541-553

Security model for emergency real-time communications in autonomous networks

Author keywords

Emergency; MANET; P2PSIP; Routing; Security; VoIP

Indexed keywords

EMERGENCY; MANET; P2PSIP; ROUTING; SECURITY; VOIP;

EID: 84865382723     PISSN: 13873326     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10796-010-9259-8     Document Type: Article
Times cited : (10)

References (19)
  • 1
    • 34547610382 scopus 로고    scopus 로고
    • Secure routing for mobile ad hoc networks
    • doi:10.1109/SNPD.2007.223
    • Argyroudis, P., & O'Mahony, D. (2005). Secure routing for mobile ad hoc networks. IEEE Communications Surveys and Tutorials, 7(3), 2-21. doi:10.1109/SNPD.2007.223.
    • (2005) IEEE Communications Surveys and Tutorials , vol.7 , Issue.3 , pp. 2-21
    • Argyroudis, P.1    O'Mahony, D.2
  • 2
    • 51949118509 scopus 로고    scopus 로고
    • IETF Internet Draft. Work in progress, November 2007
    • Baset, S., Schulzrinne, H., & Matuszewski, M. (2007). Peerto-peer protocol (P2PP). IETF Internet Draft.http://tools. ietf.org/html/draft-baset- p2psip-p2pp-01. Work in progress, November 2007.
    • (2007) Peerto-Peer Protocol (P2PP)
    • Baset, S.1    Schulzrinne, H.2    Matuszewski, M.3
  • 3
    • 84865351333 scopus 로고    scopus 로고
    • IETF Internet Draft. Work in progress, March 2010
    • Birkos, K., et al. (2010). Security mechanisms and key refresh for P2PSIP overlays. IETF Internet Draft.http://www.ietf.org/id/draft-birkos-p2psip- security-key-refresh-00.txt. Work in progress, March 2010.
    • (2010) Security Mechanisms and Key Refresh for P2PSIP Overlays
    • Birkos, K.1
  • 4
    • 36849050321 scopus 로고    scopus 로고
    • A survey of routing protocols that support QoS in mobile ad hoc networks
    • DOI 10.1109/MNET.2007.4395108
    • Chen, L., & Heinzelman, W. B. (2007). A survey of routing protocols that support QoS in mobile ad hoc networks. IEEE Network Magazine, 21(6), 30-38. doi:10.1109/MNET.2007.4395108. (Pubitemid 350226928)
    • (2007) IEEE Network , vol.21 , Issue.6 , pp. 30-38
    • Chen, L.1    Heinzelman, W.B.2
  • 7
    • 57449099847 scopus 로고    scopus 로고
    • Securing QoS signaling in IP-based military ad hoc networks
    • doi:10.1109/MCOM.2008.4689243
    • Hegland, A., & Winjum, E. (2008). Securing QoS signaling in IP-based military ad hoc networks. IEEE Communications Magazine, 46(11), 42-48. doi:10.1109/MCOM.2008.4689243.
    • (2008) IEEE Communications Magazine , vol.46 , Issue.11 , pp. 42-48
    • Hegland, A.1    Winjum, E.2
  • 8
    • 84865351332 scopus 로고    scopus 로고
    • IETF, P2PSIP Working Group
    • IETF (2010). P2PSIP Working Group.http://www.ietf.org/dyn/wg/charter/ p2psip-charter.html.
    • (2010)
  • 11
    • 67549118440 scopus 로고    scopus 로고
    • Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
    • Elsevier doi:10.1016/j.comnet.2009.04.002
    • Martigon, F., Paris, S., & Capone, A. (2009). Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks. Computer Networks (Elsevier), 53(12), 2192-2207. doi:10.1016/j.comnet. 2009.04.002.
    • (2009) Computer Networks , vol.53 , Issue.12 , pp. 2192-2207
    • Martigon, F.1    Paris, S.2    Capone, A.3
  • 12
    • 77951287085 scopus 로고    scopus 로고
    • A game theoretic approach for securing AODV in emergency mobile ad hoc networks
    • Zurich, Switzerland doi:10.1109/LCN.2009.5355020
    • Panaousis, E. A., & Politis, C. (2009). A game theoretic approach for securing AODV in emergency mobile ad hoc networks. In Proc. 34th IEEE conference on local computer networks (IEEE LCN), Zurich, Switzerland (pp. 985-992). doi:10.1109/LCN.2009.5355020.
    • (2009) Proc. 34th IEEE Conference on Local Computer Networks (IEEE LCN) , pp. 985-992
    • Panaousis, E.A.1    Politis, C.2
  • 17
    • 39049116456 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • Catalunya, Spain doi:10.1109/INFOCOM.2006154
    • Sun, Y. L., Han, Z., Yu, W., & Liu, K. J. R. (2006). A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proc. 25th IEEE international conference on computer communications, Catalunya, Spain (pp. 1-13). doi:10.1109/INFOCOM.2006.154.
    • (2006) Proc. 25th IEEE International Conference on Computer Communications , pp. 1-13
    • Sun, Y.L.1    Han, Z.2    Yu, W.3    Liu, K.J.R.4
  • 18
    • 33144479525 scopus 로고    scopus 로고
    • SCAN: Self-organized network-layer security in mobile ad hoc networks
    • DOI 10.1109/JSAC.2005.861384
    • Yang, H., Meng, X., & Lu, S. (2006). SCAN: Self-organized network-layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 261-273. doi:10.1109/JSAC.2005.861384. (Pubitemid 43269748)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 261-273
    • Yang, H.1    Shu, J.2    Meng, X.3    Lu, S.4
  • 19
    • 2442582716 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector routing
    • doi:10.1145/581291.581312
    • Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. In Proc. ACM mobile computing and communications review (MC2R) (Vol 6., No. 3, pp. 106-107). doi:10.1145/581291.581312.
    • (2002) Proc. ACM Mobile Computing and Communications Review (MC2R) , vol.6 , Issue.3 , pp. 106-107
    • Zapata, M.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.