메뉴 건너뛰기




Volumn 6, Issue 4, 2013, Pages 437-449

Performance comparison between IBE-HWMP and ECDSA-HWMP

Author keywords

ECDSA; Elliptic Curve Digital Signature Algorithm; HWMP; IBE; Routing protocols; Security; Wireless mesh networks

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MESH GENERATION; MESH NETWORKING; NETWORK PROTOCOLS; ROUTING PROTOCOLS; WIRELESS MESH NETWORKS (WMN);

EID: 84875656880     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.632     Document Type: Article
Times cited : (2)

References (27)
  • 1
    • 84875683726 scopus 로고    scopus 로고
    • IEEE P802.11s D4.0 Draft Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 10: Mesh Networking, December .
    • IEEE P802.11s D4.0 Draft Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 10: Mesh Networking, December 2009.
    • (2009)
  • 2
    • 55849149445 scopus 로고    scopus 로고
    • Simultaneous authentication of equals: a secure, password-based key exchange for mesh networks. Conference Sensor Technologies and Applications, Sensor Technologies and Applications, 2008. SENSORCOMM'08. Second International Conference, 25-31 Aug.
    • Harkins D. Simultaneous authentication of equals: a secure, password-based key exchange for mesh networks. Conference Sensor Technologies and Applications, Sensor Technologies and Applications, 2008. SENSORCOMM'08. Second International Conference, 25-31 Aug. 2008; 839-844.
    • (2008) , pp. 839-844
    • Harkins, D.1
  • 3
    • 84875662009 scopus 로고    scopus 로고
    • IETF RFC 3561. Ad hoc on-demand distance vector (AODV) routing, July .
    • Perkins C, Belding-Royer E, Das S. IETF RFC 3561. Ad hoc on-demand distance vector (AODV) routing, July 2003.
    • (2003)
    • Perkins, C.1    Belding-Royer, E.2    Das, S.3
  • 4
    • 85164895199 scopus 로고    scopus 로고
    • An efficient authenticated key establishment scheme for wireless mesh networks. GLOBECOM 2010, IEEE Global Telecommunications Conference.
    • He B, Joshi S, Agrawal DP, Sun D. An efficient authenticated key establishment scheme for wireless mesh networks. GLOBECOM 2010, IEEE Global Telecommunications Conference.
    • He, B.1    Joshi, S.2    Agrawal, D.P.3    Sun, D.4
  • 5
    • 34347349933 scopus 로고    scopus 로고
    • Ad-hoc on-demand distance vector routing. 2nd IEEE workshop on mobile computing systems and applications
    • Perkins CE, Royer EM. Ad-hoc on-demand distance vector routing. 2nd IEEE workshop on mobile computing systems and applications, 1999; 90-100.
    • (1999) , pp. 90-100
    • Perkins, C.E.1    Royer, E.M.2
  • 7
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
    • Hu Y-C, Johnson DB, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 2003; 1(1):175-192.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 10
    • 76649132289 scopus 로고    scopus 로고
    • SHWMP: a secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks
    • In, LNCS 5730, Gavrilova ML, Tan CJK (eds). Springer-Verlag: Berlin Heidelberg
    • Md. Shariful Islam, Md. Abdul Hamid, Choong Seon Hong SHWMP: a secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. In Transactions on Computer Science VI, LNCS 5730, Gavrilova ML, Tan CJK (eds). Springer-Verlag: Berlin Heidelberg, 2009; 95-114.
    • (2009) Transactions on Computer Science VI , pp. 95-114
    • Islam, M.S.1    Hamid, M.A.2    Hong, C.S.3
  • 11
    • 80052151562 scopus 로고    scopus 로고
    • On securing HWMP using IBC. Proceedings of IEEE ICC, Kyoto Japan
    • Ben-othman J, Saavedra Benitez YI. On securing HWMP using IBC. Proceedings of IEEE ICC, Kyoto Japan, 2011.
    • (2011)
    • Ben-othman, J.1    Saavedra Benitez, Y.I.2
  • 12
    • 84875641681 scopus 로고    scopus 로고
    • IBC-HWMP: a novel secure identity-based cryptography based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s. Concurrency and Computation: Practice and Experience. Article first published online: 19 Aug. 2011.
    • Ben-othman J, Saavedra Benitez YI. IBC-HWMP: a novel secure identity-based cryptography based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s. Concurrency and Computation: Practice and Experience. Article first published online: 19 Aug. 2011.
    • Ben-othman, J.1    Saavedra Benitez, Y.I.2
  • 13
    • 84857201103 scopus 로고    scopus 로고
    • Performance comparison between IBC-HWMP and Hash-HWMP. IEEE GLOBECOM, Houston, Texas, USA, 5-9 December
    • Ben-othman J, Mokdad L, Saavedra Benitez YI. Performance comparison between IBC-HWMP and Hash-HWMP. IEEE GLOBECOM, Houston, Texas, USA, 5-9 December 2011; 67-71.
    • (2011) , pp. 67-71
    • Ben-othman, J.1    Mokdad, L.2    Saavedra Benitez, Y.I.3
  • 14
    • 84856185933 scopus 로고    scopus 로고
    • A light weight security scheme for HWMP protocol using elliptic curve technique. Wireless Local Networks, Berlin, Germany, 3-7 October .
    • Ben-othman J, Saavedra Benitez YI. A light weight security scheme for HWMP protocol using elliptic curve technique. Wireless Local Networks, Berlin, Germany, 3-7 October 2011.
    • (2011)
    • Ben-othman, J.1    Saavedra Benitez, Y.I.2
  • 15
    • 84871989373 scopus 로고    scopus 로고
    • A novel mechanism to secure internal attacks in HWMP routing protocol. IEEE ICC 2012 Ad-hoc and Sensor Networking Symposium, Ottawa, Canada, June 12
    • Ben-othman J, Claude JP, Saavedra Benitez YI. A novel mechanism to secure internal attacks in HWMP routing protocol. IEEE ICC 2012 Ad-hoc and Sensor Networking Symposium, Ottawa, Canada, June 12, 2012; 162-166.
    • (2012) , pp. 162-166
    • Ben-othman, J.1    Claude, J.P.2    Saavedra Benitez, Y.I.3
  • 16
    • 84875646268 scopus 로고    scopus 로고
    • National Institute for Standards and Technology. Digital Signature Standard (DSS), Technical Report 168, January .
    • National Institute for Standards and Technology. Digital Signature Standard (DSS), Technical Report 168, January 2000.
    • (2000)
  • 19
    • 84875659260 scopus 로고    scopus 로고
    • FIPS PUB 186-3. Federal information processing standards publication. Digital Signature Standard (DSS) Category: Computer Security Subcategory: Cryptography. Information Technology Laboratory. National Institute of Standards and Technology, Gaithersburg, MD 20899-8900, Issued June
    • FIPS PUB 186-3. Federal information processing standards publication. Digital Signature Standard (DSS) Category: Computer Security Subcategory: Cryptography. Information Technology Laboratory. National Institute of Standards and Technology, Gaithersburg, MD 20899-8900, Issued June, 2009.
    • (2009)
  • 20
    • 84875647254 scopus 로고    scopus 로고
    • Elliptic Curves and Cryptography. Dr. Dobbs Journal, No. 264, April .
    • Jurisic A, Menezes AJ. Elliptic Curves and Cryptography. Dr. Dobbs Journal, No. 264, April 1997.
    • (1997)
    • Jurisic, A.1    Menezes, A.J.2
  • 21
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the Weil Pairing
    • Boneh D, Franklin MK. Identity based encryption from the Weil Pairing. In Proceeding of Crypto. 2001; 213-219.
    • (2001) Proceeding of Crypto , pp. 213-219
    • Boneh, D.1    Franklin, M.K.2
  • 22
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Shamir A. Identity based cryptosystems and signature schemes. In Proceeding of Crypto. 1984; 47-53.
    • (1984) Proceeding of Crypto , pp. 47-53
    • Shamir, A.1
  • 23
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encrytion scheme based on quadratic residues
    • 2260, Springer-Verlag, ISBN:3-540-43026-1
    • Cocks C. An identity based encrytion scheme based on quadratic residues. In Proceeding of the 8th International Conference on Cryptography and Coding, Vol. 2260, Springer-Verlag, 2001; 360-363. ISBN:3-540-43026-1, http://dl.acm.org/citation.cfm?id=742435
    • (2001) Proceeding of the 8th International Conference on Cryptography and Coding , pp. 360-363
    • Cocks, C.1
  • 24
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Springer-Verlag
    • Hess F. Efficient identity based signature schemes based on pairings. In Annual International Workshop on Selected Areas in Cryptography. Springer-Verlag, 2003; 310-324, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.1482, http://link.springer.com/content/pdf/10.1007%2F3-540-36492-7_20
    • (2003) Annual International Workshop on Selected Areas in Cryptography , pp. 310-324
    • Hess, F.1
  • 25
    • 55849149445 scopus 로고    scopus 로고
    • Simultaneous authentication of equals: a secure, password-based key exchange for mesh networks. SENSORCOMM. Conference Sensor Technologies and Applications, Aug. .
    • Harkins D. Simultaneous authentication of equals: a secure, password-based key exchange for mesh networks. SENSORCOMM. Conference Sensor Technologies and Applications, Aug. 2008.
    • (2008)
    • Harkins, D.1
  • 26
    • 84875670162 scopus 로고    scopus 로고
    • The network simulator v. 3 (ns-3).
    • The network simulator v. 3 (ns-3).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.