메뉴 건너뛰기




Volumn , Issue , 2012, Pages 102-110

Applicability of crypto-based security approaches in tactical wireless multi-hop networks

Author keywords

Cryptography; Security Approaches; Tactical Wireless Multi hop Networks

Indexed keywords

HIGH PROBABILITY; MULTIHOP NETWORKS; PUBLIC SAFETY; ROUTING SECURITY; SECURITY APPROACH; SENSITIVE DATAS; WIRELESS MULTI-HOP NETWORK;

EID: 84874302345     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2012.6423584     Document Type: Conference Paper
Times cited : (1)

References (40)
  • 9
    • 84874322986 scopus 로고    scopus 로고
    • (2011, November) Cpu limit
    • (2011, November) Cpu limit. [Online]. Available: http://cpulimit. sourceforge.net/
  • 10
    • 84874325047 scopus 로고    scopus 로고
    • (2010) Crypto++ Library 5.6.1-a Free C++ Class Library of Cryptographic Schemes
    • (2010) Crypto++ Library 5.6.1-a Free C++ Class Library of Cryptographic Schemes. [Online]. Available: http://www.cryptopp.com/
  • 19
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Y.-C. Hu, D. B. Johnson, and A. Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks," Ad Hoc Networks, vol. 1, no. 1, pp. 175-192, 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 24
    • 33745269795 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for wireless sensor networks
    • Y. W. Law, J. Doumen, and P. Hartel, "Survey and Benchmark of Block Ciphers for Wireless Sensor Networks," ACM Transactions on Sensor Networks (TOSN), vol. 2, no. 1, pp. 65-93, 2006.
    • (2006) ACM Transactions on Sensor Networks (TOSN) , vol.2 , Issue.1 , pp. 65-93
    • Law, Y.W.1    Doumen, J.2    Hartel, P.3
  • 26
    • 84874319166 scopus 로고    scopus 로고
    • (2011) OpenSSL: The Open Source toolkit for SSL/TLS
    • (2011) OpenSSL: The Open Source toolkit for SSL/TLS. [Online]. Available: http://www.openssl.org/
  • 28
    • 84891993846 scopus 로고    scopus 로고
    • Routing security in ad hoc wireless networks
    • S. C.-H. Huang, D. MacCallum, and D.-Z. Du, Eds. Springer Science+Business Media
    • M. O. Pervaiz, M. Cardei, and J. Wu, "Routing Security in Ad Hoc Wireless Networks," in Network Security, S. C.-H. Huang, D. MacCallum, and D.-Z. Du, Eds. Springer Science+Business Media, 2010, pp. 117-142.
    • (2010) Network Security , pp. 117-142
    • Pervaiz, M.O.1    Cardei, M.2    Wu, J.3
  • 33
    • 84855203308 scopus 로고    scopus 로고
    • Computational and energy costs of cryptographic algorithms on handheld devices
    • H. Rif'a-Pous and J. Herrera-Joancomart?, "Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices," Future Internet, vol. 3, no. 1, pp. 31-48, 2011.
    • (2011) Future Internet , vol.3 , Issue.1 , pp. 31-48
    • Rif'a-Pous, H.1    Herrera-Joancomart, J.2
  • 34
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.