메뉴 건너뛰기




Volumn 25, Issue 5, 2013, Pages 686-700

IBC-HWMP: A novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s

Author keywords

HWMP; IBC; security; wireless mesh protocol

Indexed keywords

CRYPTOGRAPHY; DISTRIBUTED DATABASE SYSTEMS; ELECTRONIC DATA INTERCHANGE; MESH GENERATION; NETWORK SECURITY;

EID: 84875228943     PISSN: 15320626     EISSN: 15320634     Source Type: Journal    
DOI: 10.1002/cpe.1813     Document Type: Article
Times cited : (22)

References (33)
  • 1
    • 13844296355 scopus 로고    scopus 로고
    • Wireless mesh networks: A survey
    • DOI 10.1016/j.comnet.2004.12.001, PII S1389128604003457
    • Akyildiz I, Wang X, Wang W,. Wireless mesh networks: a survey. Computer Networks and ISDN Systems 2005; 47 (4): 445-487. (Pubitemid 40242422)
    • (2005) Computer Networks , vol.47 , Issue.4 , pp. 445-487
    • Akyildiz, I.F.1    Wang, X.2    Wang, W.3
  • 5
    • 34547545598 scopus 로고    scopus 로고
    • A secure authentication and billing architecture for wireless mesh networks
    • DOI 10.1007/s11276-006-8148-z
    • Zhang Y, Fang Y,. A secure authentication and billing architecture for wireless mesh networks. Wireless Networks 2007; 13 (5): 663-678. (Pubitemid 47185254)
    • (2007) Wireless Networks , vol.13 , Issue.5 , pp. 663-678
    • Zhang, Y.1    Fang, Y.2
  • 7
    • 85031307530 scopus 로고
    • Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
    • London, UK, 31 August-2 September August;. One revised version of the paper is available from
    • Perkins CE, Bhagwat P,. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, Proceedings of the SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications, London, UK, 31 August-2 September 1994 August; 234-244. One revised version of the paper is available fromhttp://www.es.umd.edu/projects/mcml/papers/Sigcomm94. ps.
    • (1994) Proceedings of the SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications , pp. 234-244
    • Perkins, C.E.1    Bhagwat, P.2
  • 12
    • 33845295488 scopus 로고    scopus 로고
    • Secure routing with the AODV protocol
    • DOI 10.1109/APCC.2005.1554018, 1554018, 2005 Asia-Pacific Conference on Communications
    • Pirzada AA, McDonald C,. Secure routing with the AODV protocol, Proceedings of the Asia-Pacific Conference on Communications, Peth, Western Australia, 3-5 October 2005; 57-61. (Pubitemid 44868156)
    • (2005) 2005 Asia-Pacific Conference on Communications , vol.2005 , pp. 57-61
    • Pirzada, A.A.1    McDonald, C.2
  • 13
    • 0035178273 scopus 로고    scopus 로고
    • Security enhancements in AODV protocol for wireless Ad Hoc networks
    • Bhargava S, Agrawal DP,. Security enhancements in AODV protocol for wireless ad hoc networks, Proceedings of the IEEE 54th Vehicular Technology Conference (VTC 2001 Fall), Atlantic City, NJ, USA, 2001; 2143-2147. (Pubitemid 33088632)
    • (2001) IEEE Vehicular Technology Conference , vol.4 , Issue.54 , pp. 2143-2147
    • Bhargava, S.1    Agrawal, D.P.2
  • 17
    • 80053067859 scopus 로고    scopus 로고
    • Securing route discovery in MAODV for wireless sensor network
    • Shyamala R, Valli S,. Securing route discovery in MAODV for wireless sensor network. UbiCC Journal 2009; 4 (3): 775-783.
    • (2009) UbiCC Journal , vol.4 , Issue.3 , pp. 775-783
    • Shyamala, R.1    Valli, S.2
  • 20
  • 21
    • 39149127588 scopus 로고    scopus 로고
    • Cryptographic Versus Trust-based Methods for MANET Routing Security
    • DOI 10.1016/j.entcs.2007.12.022, PII S1571066108000613
    • Cordasco J, Wetzel S,. Cryptographic versus trust-based methods for MANET routing security. Electronic Notes in Theoretical Computer Science 2008; 197 (2): 131-140. (Pubitemid 351253804)
    • (2008) Electronic Notes in Theoretical Computer Science , vol.197 , Issue.2 , pp. 131-140
    • Cordasco, J.1    Wetzel, S.2
  • 23
  • 25
    • 44149108653 scopus 로고    scopus 로고
    • IEEE 802.11s wireless mesh networks: Framework and challenges
    • Wang X, Lim AO,. IEEE 802.11s wireless mesh networks: framework and challenges. Ad Hoc Networks 6 (6): 970-984.
    • Ad Hoc Networks , vol.6 , Issue.6 , pp. 970-984
    • Wang, X.1    Lim, A.O.2
  • 26
    • 33646706570 scopus 로고    scopus 로고
    • Securing wireless mesh networks
    • DOI 10.1109/MWC.2006.1632480
    • Salem NB, Hubaux J-P,. Securing wireless mesh networks. IEEE Wireless Communications 2006; 13 (2): 50-55. (Pubitemid 43742768)
    • (2006) IEEE Wireless Communications , vol.13 , Issue.2 , pp. 50-55
    • Salem, N.B.1    Hubaux, J.-P.2
  • 29
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology, Santa Barbara, CA, USA, 19-22 August
    • Shamir CS,. Identity-based cryptosystems and signature schemes, Proceedings of CRYPTO '84, Advances in Cryptology, Santa Barbara, CA, USA, 19-22 August 1984; 47-53.
    • (1984) Proceedings of CRYPTO '84 , pp. 47-53
    • Shamir, C.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.