메뉴 건너뛰기




Volumn 24, Issue 4, 2013, Pages 629-641

A secure protocol for spontaneous wireless Ad Hoc networks creation

Author keywords

Distributed protocol; secure protocol; spontaneous network; wireless ad hoc networks

Indexed keywords

DISTRIBUTED PROTOCOLS; NETWORK CREATION; PROTOCOL MESSAGE; SECURE PROTOCOLS; SECURE SERVICES; SECURITY ANALYSIS; SHARING RESOURCES; SPONTANEOUS NETWORKS;

EID: 84874876498     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2012.168     Document Type: Article
Times cited : (48)

References (40)
  • 1
    • 0035363950 scopus 로고    scopus 로고
    • Spontaneous networking: An application-oriented approach to ad hoc networking
    • DOI 10.1109/35.925687
    • L.M. Feeney, B. Ahlgren, and A. Westerlund, "Spontaneous Networking: An Application-Oriented Approach to Ad-hoc Networking," IEEE Comm. Magazine, vol. 39, no. 6, pp. 176-181, June 2001. (Pubitemid 32583325)
    • (2001) IEEE Communications Magazine , vol.39 , Issue.6 , pp. 176-181
    • Feeney, L.M.1    Ahlgren, B.2    Westerlund, A.3
  • 2
    • 84863073593 scopus 로고    scopus 로고
    • User-oriented and service-oriented spontaneous ad hoc and sensor wireless networks
    • J. Lloret, L. Shu, R. Lacuesta, and M. Chen, "User-Oriented and Service-Oriented Spontaneous Ad Hoc and Sensor Wireless Networks," Ad Hoc and Sensor Wireless Networks, vol. 14, nos. 1/ 2, pp. 1-8, 2012.
    • (2012) Ad Hoc and Sensor Wireless Networks , vol.14 , Issue.1-2 , pp. 1-8
    • Lloret, J.1    Shu, L.2    Lacuesta, R.3    Chen, M.4
  • 3
    • 77955290890 scopus 로고    scopus 로고
    • Overview of spontaneous networking - Evolving concepts and technologies
    • S. Preuß and C.H. Cap, "Overview of Spontaneous Networking - Evolving Concepts and Technologies," Rostocker Informatik- Berichte, vol. 24, pp. 113-123, 2000.
    • (2000) Rostocker Informatik- Berichte , vol.24 , pp. 113-123
    • Preuß, S.1    Cap, C.H.2
  • 5
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
    • Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A Survey of Key Management Schemes in Wireless Sensor Networks," Computer Comm., vol. 30, nos. 11/12, pp. 2314-2341, Sept. 2007. (Pubitemid 47285291)
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 6
    • 66649108365 scopus 로고    scopus 로고
    • Securing wireless sensor networks with public key techniques
    • V. Kumar and M.L. Das, "Securing Wireless Sensor Networks with Public Key Techniques," Ad Hoc and Sensor Wireless Networks, vol. 5, nos. 3/4, pp. 189-201, 2008.
    • (2008) Ad Hoc and Sensor Wireless Networks , vol.5 , Issue.3-4 , pp. 189-201
    • Kumar, V.1    Das, M.L.2
  • 7
    • 33745197327 scopus 로고    scopus 로고
    • LHAP: A lightweight network access control protocol for ad hoc networks
    • DOI 10.1016/j.adhoc.2005.06.002, PII S1570870505000387
    • S. Zhu, S. Xu, S. Setia, and S. Jajodia, "LHAP: A Lightweight Hopby- Hop Authentication Protocol For Ad-Hoc Networks," Ad Hoc Networks J., vol. 4, no. 5, pp. 567-585, Sept. 2006. (Pubitemid 43913099)
    • (2006) Ad Hoc Networks , vol.4 , Issue.5 , pp. 567-585
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4
  • 8
    • 78751520891 scopus 로고    scopus 로고
    • Dynamic threshold cryptosystem without group manager
    • Oct.
    • A. Noack and S. Spitz, "Dynamic Threshold Cryptosystem without Group Manager," Network Protocols and Algorithms, vol. 1, no. 1, Oct. 2009.
    • (2009) Network Protocols and Algorithms , vol.1 , Issue.1
    • Noack, A.1    Spitz, S.2
  • 9
    • 78651427233 scopus 로고    scopus 로고
    • Key pre-distribution scheme with node revocation for wireless sensor networks
    • J. Yan, J. Ma, F. Li, and S.J. Moon, "Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks," Ad Hoc and Sensor Wireless Networks, vol. 10, nos. 2/3, pp. 235-251, 2010.
    • (2010) Ad Hoc and Sensor Wireless Networks , vol.10 , Issue.2-3 , pp. 235-251
    • Yan, J.1    Ma, J.2    Li, F.3    Moon, S.J.4
  • 10
    • 79960583916 scopus 로고    scopus 로고
    • Security aspects in mobile Ad Hoc network (MANETs): Technical review
    • Dec.
    • M. Mukesh and K.R. Rishi, "Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review," Int'l J. Computer Applications, vol. 12, no. 2, pp. 37-43, Dec. 2010.
    • (2010) Int'l J. Computer Applications , vol.12 , Issue.2 , pp. 37-43
    • Mukesh, M.1    Rishi, K.R.2
  • 11
    • 84874848444 scopus 로고    scopus 로고
    • Impact of security attacks on a new security protocol for mobile ad hoc networks
    • K. Sahadevaiah and P.V.G.D. Prasad Reddy, "Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks," Network Protocols and Algorithms, vol 3, no. 4, pp. 122-140, 2011.
    • (2011) Network Protocols and Algorithms , vol.3 , Issue.4 , pp. 122-140
    • Sahadevaiah, K.1    Prasad Reddy, P.V.G.D.2
  • 15
    • 3142734903 scopus 로고    scopus 로고
    • A communication architecture for spontaneous systems
    • June
    • J. Latvakoski, D. Pakkala, and P. Paakkonen, "A Communication Architecture for Spontaneous Systems," IEEE Wireless Comm., vol. 11, no. 3, pp. 36-42, June 2004.
    • (2004) EE Wireless Comm. , vol.11 , Issue.3 , pp. 36-42
    • Latvakoski, J.1    Pakkala, D.2    Paakkonen, P.3
  • 16
    • 84863038265 scopus 로고    scopus 로고
    • Adaptive service discovery on service-oriented and spontaneous sensor systems
    • L. Liu, J. Xu, N. Antonopoulos, J. Li, and K. Wu, "Adaptive Service Discovery on Service-Oriented and Spontaneous Sensor Systems," Ad Hoc and Sensor Wireless Networks, vol. 14, nos. 1/2, pp. 107-132, 2012.
    • (2012) Ad Hoc and Sensor Wireless Networks , vol.14 , Issue.1-2 , pp. 107-132
    • Liu, L.1    Xu, J.2    Antonopoulos, N.3    Li, J.4    Wu, K.5
  • 22
    • 32244434861 scopus 로고    scopus 로고
    • SyncTap: Synchronous user operation for spontaneous network connection
    • May
    • J. Rekimoto, "SyncTap: Synchronous User Operation for Spontaneous Network Connection," Personal and Ubiquitous Computing, vol. 8, no. 2, pp. 126-134, May 2004.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.2 , pp. 126-134
    • Rekimoto, J.1
  • 24
    • 79251595458 scopus 로고    scopus 로고
    • Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
    • Mar.
    • R. Lacuesta, J. Lloret, M. Garcia, and L. Penalver, "Two Secure and Energy-Saving Spontaneous Ad-Hoc Protocol for Wireless Mesh Client Networks," J. Network and Computer Applications, vol. 34, no. 2, pp. 492-505, Mar. 2011.
    • (2011) J. Network and Computer Applications , vol.34 , Issue.2 , pp. 492-505
    • Lacuesta, R.1    Lloret, J.2    Garcia, M.3    Penalver, L.4
  • 25
    • 77955229114 scopus 로고    scopus 로고
    • An identity-based security system for user privacy in vehicular ad hoc networks
    • Set
    • J. Sun, C. Zhang, Y. Zhang, and Y. (Michael) Fang, "An Identity- Based Security System for User Privacy in Vehicular Ad Hoc Networks," IEEE Trans. Parallel and Distributed Systems, vol. 21, no. 9, pp. 1227-1239, Sept. 2010.
    • (2010) IEEE Trans. Parallel and Distributed Systems , vol.21 , Issue.9 , pp. 1227-1239
    • Sun, J.1    Zhang, C.2    Zhang, Y.3    Fang, Y.M.4
  • 26
    • 84874832470 scopus 로고    scopus 로고
    • FIPS 180-1 - Secure Hash Standard SHA-1, Feb.
    • FIPS 180-1 - Secure Hash Standard, SHA-1, "National Institute of Standards and Technology," http://www.itl.nist.gov/fipspubs/fip180-1.htm, Feb. 27, 2012.
    • (2012) National Institute of Standards and Technology , vol.27
  • 29
    • 68549107605 scopus 로고    scopus 로고
    • An energy efficient reconfigurable public-key cryptography processor architecture
    • Cryptographic Hardware and Embedded Systems - CHES 2000 Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings
    • J. Goodman and A. Chandrakasan, "An Energy Efficient Reconfigurable Public-Key Cryptography Processor Architecture," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '00), pp. 175-190, 2000. (Pubitemid 33213966)
    • (2000) Lecture Notes in Computer Science , Issue.1965 , pp. 175-190
    • Goodman, J.1    Chandrakasan, A.2
  • 30
    • 1442350122 scopus 로고    scopus 로고
    • Communications security for the twenty-first century: The advanced encryption standard
    • Apr
    • S. Landau, "Communications Security for the Twenty-First Century: The Advanced Encryption Standard," Notices of the Am. Math. Soc., vol. 47, no. 4, pp 450-459, Apr. 2000.
    • (2000) Notices of the Am. Math. Soc. , vol.47 , Issue.4 , pp. 450-459
    • Landau, S.1
  • 34
    • 84863038265 scopus 로고    scopus 로고
    • Adaptive service discovery on service-oriented and spontaneous sensor systems
    • L. Liu, J. Xu, N. Antonopoulos, J. Li, and K. Wu, "Adaptive Service Discovery on Service-Oriented and Spontaneous Sensor Systems," Adhoc and Sensor Wireless Networks, vol. 14, nos. 1/2, pp. 107-132, 2012.
    • (2012) Adhoc and Sensor Wireless Networks , vol.14 , Issue.1-2 , pp. 107-132
    • Liu, L.1    Xu, J.2    Antonopoulos, N.3    Li, J.4    Wu, K.5
  • 35
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Jan.-Mar
    • S. Capkun, L. Buttyan, and J.-P. Hubaux, "Self-Organized Public- Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan.-Mar. 2003.
    • (2003) IEEE Trans. Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.-P.3
  • 39
    • 84874826489 scopus 로고    scopus 로고
    • Feb.
    • Netbeans website, at: http://netbeans.org/, Feb. 2012.
    • (2012) Netbeans Website


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.