메뉴 건너뛰기




Volumn 11, Issue 3, 2013, Pages 1046-1061

A key management and secure routing integrated framework for Mobile Ad-hoc Networks

Author keywords

Key management; Mobile Ad hoc Networks; Secure routing

Indexed keywords

ASYMMETRIC CRYPTOGRAPHY; IDENTITY BASED CRYPTOGRAPHY; INTEGRATED FRAMEWORKS; KEY MANAGEMENT; MOBILE ADHOC NETWORK (MANETS); SECURE ROUTING; SECURITY FEATURES; SYMMETRIC CRYPTOGRAPHY;

EID: 84875695373     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2012.11.005     Document Type: Article
Times cited : (41)

References (33)
  • 1
    • 4544385042 scopus 로고    scopus 로고
    • An authenticated broadcasting scheme for wireless ad hoc network
    • IEEE Computer Society
    • M.J. Bohio, and A. Miri An authenticated broadcasting scheme for wireless ad hoc network Proc. CNSR 2004 2004 IEEE Computer Society 69 74
    • (2004) Proc. CNSR 2004 , pp. 69-74
    • Bohio, M.J.1    Miri, A.2
  • 2
    • 7744225358 scopus 로고    scopus 로고
    • Efficient identity-based security schemes for ad hoc network routing protocols
    • M.J. Bohio, and A. Miri Efficient identity-based security schemes for ad hoc network routing protocols J. Ad Hoc Netw. 2 3 2004 309 317
    • (2004) J. Ad Hoc Netw. , vol.2 , Issue.3 , pp. 309-317
    • Bohio, M.J.1    Miri, A.2
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • LNCS Springer
    • D. Boneh, and M. Franklin Identity-based encryption from the weil pairing Proc. Crypto 2001 LNCS 2001 Springer 213 219
    • (2001) Proc. Crypto 2001 , pp. 213-219
    • Boneh, D.1    Franklin, M.2
  • 4
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • LNCS Springer
    • D. Boneh, B. Lynn, and H. Shacham Short signatures from the weil pairing Proc. ASIACRYPT LNCS 2001 Springer 514 532
    • (2001) Proc. ASIACRYPT , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 7
    • 34548839108 scopus 로고    scopus 로고
    • Improved id-based security framework for ad hoc network
    • H.-Y. Chien, and R.-Y. Lin Improved id-based security framework for ad hoc network Ad Hoc Netw. 6 1 2008 47 60
    • (2008) Ad Hoc Netw. , vol.6 , Issue.1 , pp. 47-60
    • Chien, H.-Y.1    Lin, R.-Y.2
  • 9
    • 7744232568 scopus 로고    scopus 로고
    • TIDS: Threshold and identity-based security scheme for wireless ad hoc networks
    • H. Deng, and D.P. Agrawal TIDS: threshold and identity-based security scheme for wireless ad hoc networks Ad Hoc Netw. 2 3 2004 291 307
    • (2004) Ad Hoc Netw. , vol.2 , Issue.3 , pp. 291-307
    • Deng, H.1    Agrawal, D.P.2
  • 10
    • 3042546547 scopus 로고    scopus 로고
    • Threshold and identity-based key management and authentication for wireless ad hoc networks
    • IEEE
    • H. Deng, A. Mukherjee, and D.P. Agrawal Threshold and identity-based key management and authentication for wireless ad hoc networks Proc. ITCC 2004 IEEE 107 111
    • (2004) Proc. ITCC , pp. 107-111
    • Deng, H.1    Mukherjee, A.2    Agrawal, D.P.3
  • 11
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • S. Goldwasser, S. Micali, and R.L. Rivest A digital signature scheme secure against adaptive chosen-message attacks J. SIAM Comput. 17 April 1988 281 308
    • (1988) J. SIAM Comput. , vol.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 13
    • 84943807207 scopus 로고    scopus 로고
    • Toward secure key distribution in truly ad-hoc networks
    • IEEE
    • A. Khalili, J. Katz, and W.A. Arbaugh Toward secure key distribution in truly ad-hoc networks Proc. SAINT Workshops 2003 IEEE 342 346
    • (2003) Proc. SAINT Workshops , pp. 342-346
    • Khalili, A.1    Katz, J.2    Arbaugh, W.A.3
  • 15
    • 1642464769 scopus 로고    scopus 로고
    • On-demand secure routing protocol for ad hoc network using id based cryptosystem
    • IEEE
    • Y.-H. Lee, H. Kim, B. Chung, J. Lee, and H. Yoon On-demand secure routing protocol for ad hoc network using id based cryptosystem Proc. 4th ICPDCAT 2003 IEEE 211 215
    • (2003) Proc. 4th ICPDCAT , pp. 211-215
    • Lee, Y.-H.1    Kim, H.2    Chung, B.3    Lee, J.4    Yoon, H.5
  • 17
    • 34147173361 scopus 로고    scopus 로고
    • A survey on peer-to-peer key management for mobile ad hoc networks
    • J.V.D. Merwe, D. Dawoud, and S. McDonald A survey on peer-to-peer key management for mobile ad hoc networks ACM Comput. Surv. 39 1 2007 1 45
    • (2007) ACM Comput. Surv. , vol.39 , Issue.1 , pp. 1-45
    • Merwe, J.V.D.1    Dawoud, D.2    McDonald, S.3
  • 18
    • 25844478002 scopus 로고    scopus 로고
    • ISMANET: A secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks
    • B.-N. Park, and W. Lee ISMANET: a secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks J. IEICE Trans. Commun. 2005 2548 2556
    • (2005) J. IEICE Trans. Commun. , pp. 2548-2556
    • Park, B.-N.1    Lee, W.2
  • 23
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir How to share a secret Commun. ACM 22 1 1979 612 613
    • (1979) Commun. ACM , vol.22 , Issue.1 , pp. 612-613
    • Shamir, A.1
  • 26
    • 33748622050 scopus 로고    scopus 로고
    • MASK: Anonymous on-demand routing in mobile ad hoc networks
    • IEEE
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang MASK: anonymous on-demand routing in mobile ad hoc networks Wireless Commun. 2006 IEEE 2376 2385
    • (2006) Wireless Commun. , pp. 2376-2385
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 30
    • 84875734081 scopus 로고    scopus 로고
    • PAPA-UIC: A design approach and a framework for secure mobile ad hoc networks
    • S. Zhao, and A. Aggarwal PAPA-UIC: a design approach and a framework for secure mobile ad hoc networks J. Secur. Commun. Netw. 3 2010 371 383
    • (2010) J. Secur. Commun. Netw. , vol.3 , pp. 371-383
    • Zhao, S.1    Aggarwal, A.2
  • 33
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou, and Z.J. Haas Securing ad hoc networks J. IEEE Netw. 13 6 1999 24 30
    • (1999) J. IEEE Netw. , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.