메뉴 건너뛰기




Volumn 3, Issue 5, 2010, Pages 371-383

PAPA-UIC: A design approach and a framework for secure mobile ad hoc networks

Author keywords

ad hoc networks; Framework; Identity based cryptography

Indexed keywords

AD HOC NETWORKS; MOBILE SECURITY; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; ROUTING PROTOCOLS;

EID: 84875734081     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.150     Document Type: Article
Times cited : (3)

References (38)
  • 1
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: a secure on-demand routing protocol for ad hoc networks
    • Hu YC, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless Networks 2005; 11(1-2): 21-38.
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 2
    • 84904904836 scopus 로고    scopus 로고
    • A secure routing protocol for ad hoc networks. ICNP, IEEE Computer Society, Proceedings of 10th IEEE International Conference on Network Protocols.
    • Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM. A secure routing protocol for ad hoc networks. ICNP, IEEE Computer Society, Proceedings of 10th IEEE International Conference on Network Protocols 2002; 78-89.
    • (2002) , pp. 78-89
    • Sanzgiri, K.1    Dahill, B.2    Levine, B.N.3    Shields, C.4    Belding-Royer, E.M.5
  • 4
    • 34147173361 scopus 로고    scopus 로고
    • A survey on peer-to-peer key management for mobile ad hoc networks
    • Merwe JVD, Dawoud D, McDonald S. A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Surveys 2007; 39(1): 1-45.
    • (2007) ACM Computing Surveys , vol.39 , Issue.1 , pp. 1-45
    • Merwe, J.V.D.1    Dawoud, D.2    McDonald, S.3
  • 5
    • 34247485399 scopus 로고    scopus 로고
    • A deployment tool for public safety ad-hoc networks. Proceedings of COMSWARE 2006, New Delhi, India
    • Zhao S, Jaskiewicz D, Karvo J. A deployment tool for public safety ad-hoc networks. Proceedings of COMSWARE 2006, New Delhi, India, 2006.
    • (2006)
    • Zhao, S.1    Jaskiewicz, D.2    Karvo, J.3
  • 6
    • 84877906755 scopus 로고    scopus 로고
    • Connectivity enhancement in deployable ad-hoc networks with moving nodes. 15th IST Mobile & Wireless Communications Summit, Myconos, Greece
    • Zhao S, Karvo J, Koskinen H. Connectivity enhancement in deployable ad-hoc networks with moving nodes. 15th IST Mobile & Wireless Communications Summit, Myconos, Greece, 2006.
    • (2006)
    • Zhao, S.1    Karvo, J.2    Koskinen, H.3
  • 7
    • 37149015186 scopus 로고    scopus 로고
    • A smart card based distributed identity management infrastructure for mobile ad hoc networks. Proceedings of WISTP, Lecture Notes in Computer Science, Vol. 4462, Springer
    • Atallah E, Chaumette S. A smart card based distributed identity management infrastructure for mobile ad hoc networks. Proceedings of WISTP, Lecture Notes in Computer Science, Vol. 4462, Springer, 2007; 1-13.
    • (2007) , pp. 1-13
    • Atallah, E.1    Chaumette, S.2
  • 8
    • 1642464769 scopus 로고    scopus 로고
    • On-demand secure routing protocol for ad hoc network using id based cryptosystem. Proceedings of 4th ICPDCAT, IEEE
    • Lee YH, Kim H, Chung B, Lee J, Yoon H. On-demand secure routing protocol for ad hoc network using id based cryptosystem. Proceedings of 4th ICPDCAT, IEEE, 2003; 211-215.
    • (2003) , pp. 211-215
    • Lee, Y.H.1    Kim, H.2    Chung, B.3    Lee, J.4    Yoon, H.5
  • 9
    • 24144443813 scopus 로고    scopus 로고
    • LSRP: a lightweight secure routing protocol with low cost for ad-hoc networks. Proceedings of International Conference on Convergence in Broadband and Mobile Networking, LNCS, Vol. 3391, Springer
    • Park BN, Myung J, Lee W. LSRP: a lightweight secure routing protocol with low cost for ad-hoc networks. Proceedings of International Conference on Convergence in Broadband and Mobile Networking, LNCS, Vol. 3391, Springer, 2005; 160-169.
    • (2005) , pp. 160-169
    • Park, B.N.1    Myung, J.2    Lee, W.3
  • 10
    • 33744972272 scopus 로고    scopus 로고
    • Security enhancement in ad hoc network with id-based cryptosystem. Proceedings of the 7th International Conference on Advanced Communication Technology, IEEE Computer Society Press
    • Song J, Kim H, Lee S, Yoon H. Security enhancement in ad hoc network with id-based cryptosystem. Proceedings of the 7th International Conference on Advanced Communication Technology, IEEE Computer Society Press, 2005.
    • (2005)
    • Song, J.1    Kim, H.2    Lee, S.3    Yoon, H.4
  • 11
    • 25844478002 scopus 로고    scopus 로고
    • ISMANET: a secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks
    • Park BN, Lee W. ISMANET: a secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks. IEICE Transactions on Communications 2005; .
    • (2005) IEICE Transactions on Communications
    • Park, B.N.1    Lee, W.2
  • 12
    • 35048904149 scopus 로고    scopus 로고
    • Optimizing authentication mechanisms using ID-based cryptography in ad hoc wireless mobile networks. Proceedings of International Conference on Information Networking, Networking Technologies for Broadband and Mobile Networks, LNCS, Vol. 3090, Springer
    • Lee W, Sriborrirux W. Optimizing authentication mechanisms using ID-based cryptography in ad hoc wireless mobile networks. Proceedings of International Conference on Information Networking, Networking Technologies for Broadband and Mobile Networks, LNCS, Vol. 3090, Springer, 2004; 925-934.
    • (2004) , pp. 925-934
    • Lee, W.1    Sriborrirux, W.2
  • 13
    • 7744232568 scopus 로고    scopus 로고
    • TIDS: threshold and identity-based security scheme for wireless ad hoc networks
    • Deng H, Agrawal DP. TIDS: threshold and identity-based security scheme for wireless ad hoc networks. Ad Hoc Networks 2004; 2(3): 291-307.
    • (2004) Ad Hoc Networks , vol.2 , Issue.3 , pp. 291-307
    • Deng, H.1    Agrawal, D.P.2
  • 14
    • 3042546547 scopus 로고    scopus 로고
    • Threshold and identity-based key management and authentication for wireless ad hoc networks. ITCC (1), IEEE Computer Society
    • Deng H, Mukherjee A, Agrawal DP. Threshold and identity-based key management and authentication for wireless ad hoc networks. ITCC (1), IEEE Computer Society, 2004; 107-111.
    • (2004) , pp. 107-111
    • Deng, H.1    Mukherjee, A.2    Agrawal, D.P.3
  • 16
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L, Haas ZJ. Securing ad hoc networks. IEEE Network 1999; 13(6): 24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 17
    • 84877892572 scopus 로고    scopus 로고
    • Secure extension to the olsr protocol. Proceedings of OLSR Interop and Workshop
    • Hafslund A, Tonnesen A, Andersson J, Rotvik RB, Kure O. Secure extension to the olsr protocol. Proceedings of OLSR Interop and Workshop, 2004.
    • (2004)
    • Hafslund, A.1    Tonnesen, A.2    Andersson, J.3    Rotvik, R.B.4    Kure, O.5
  • 18
    • 33744502133 scopus 로고    scopus 로고
    • Secure OLSR. Proceedings of the 19th International Conference on Advanced Information Networking and Applications
    • Hong F, Hong L, Fu C. Secure OLSR. Proceedings of the 19th International Conference on Advanced Information Networking and Applications, 2005.
    • (2005)
    • Hong, F.1    Hong, L.2    Fu, C.3
  • 19
    • 84877895609 scopus 로고    scopus 로고
    • Attacks against OLSR: distributed key management for security. Proceedings of OLSR Interop and Workshop
    • Adjih C, Raffo D, Muhlethaler P. Attacks against OLSR: distributed key management for security. Proceedings of OLSR Interop and Workshop, 2005.
    • (2005)
    • Adjih, C.1    Raffo, D.2    Muhlethaler, P.3
  • 20
    • 85163569142 scopus 로고    scopus 로고
    • Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference 2003, IEEE Computer Society Press
    • Bobba R, Eschenauer L, Gligor V, Arbaugh W. Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference 2003, IEEE Computer Society Press, 2003.
    • (2003)
    • Bobba, R.1    Eschenauer, L.2    Gligor, V.3    Arbaugh, W.4
  • 21
    • 56349109552 scopus 로고    scopus 로고
    • Distributed and secure bootstrapping of mobile ad hoc networks: framework and constructions
    • Xu S, Čapkun S. Distributed and secure bootstrapping of mobile ad hoc networks: framework and constructions. ACM Transactions on Information and System Security 2008; 12(1): 1-37. doi: http://doi.acm.org/10.1145/1410234.1410236
    • (2008) ACM Transactions on Information and System Security , vol.12 , Issue.1 , pp. 1-37
    • Xu, S.1    Čapkun, S.2
  • 22
    • 84943807207 scopus 로고    scopus 로고
    • Toward secure key distribution in truly ad-hoc networks. SAINT Workshops, IEEE Computer Society
    • Khalili A, Katz J, Arbaugh WA. Toward secure key distribution in truly ad-hoc networks. SAINT Workshops, IEEE Computer Society, 2003; 342-346.
    • (2003) , pp. 342-346
    • Khalili, A.1    Katz, J.2    Arbaugh, W.A.3
  • 23
    • 84877919517 scopus 로고    scopus 로고
    • Identity based authenticated key agreement protocols from pairings. Technical Report HPL-2003-25, Hewlett Packard Laboratories Feb 12 .
    • Chen L, Kudla C. Identity based authenticated key agreement protocols from pairings. Technical Report HPL-2003-25, Hewlett Packard Laboratories Feb 12 2003.
    • (2003)
    • Chen, L.1    Kudla, C.2
  • 24
    • 84877896045 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves. Report 2002/004, Cryptology ePrint Archive January .
    • Paterson KG. ID-based signatures from pairings on elliptic curves. Report 2002/004, Cryptology ePrint Archive January 2002.
    • (2002)
    • Paterson, K.G.1
  • 25
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings. SAC: Annual International Workshop on Selected Areas in Cryptography, Vol. 2595, LNCS
    • Hess F. Efficient identity based signature schemes based on pairings. SAC: Annual International Workshop on Selected Areas in Cryptography, Vol. 2595, LNCS, 2003.
    • (2003)
    • Hess, F.1
  • 26
    • 84877885791 scopus 로고    scopus 로고
    • Gentry. Certificate-based encryption and the certificate revocation problem. EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT
    • Gentry. Certificate-based encryption and the certificate revocation problem. EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT, 2003.
    • (2003)
  • 27
    • 84877896621 scopus 로고    scopus 로고
    • Secure Key Issuing in ID-based Cryptography, Conferences in Research and Practice in Information Technology, Vol. 32. ACS
    • Lee B, Boyd C, Dawson E, Kim K, Yang J, Yoo S. Secure Key Issuing in ID-based Cryptography, Conferences in Research and Practice in Information Technology, Vol. 32. ACS, 2004.
    • (2004)
    • Lee, B.1    Boyd, C.2    Dawson, E.3    Kim, K.4    Yang, J.5    Yoo, S.6
  • 28
    • 0242696170 scopus 로고    scopus 로고
    • ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. ACM MOBIHOC'03
    • Kong J, Hong X. ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. ACM MOBIHOC'03, 2003; 291-302.
    • (2003) , pp. 291-302
    • Kong, J.1    Hong, X.2
  • 29
    • 25844443821 scopus 로고    scopus 로고
    • Anonymous communications in mobile ad hoc networks. INFOCOM, IEEE
    • Zhang Y, Liu W, Lou W. Anonymous communications in mobile ad hoc networks. INFOCOM, IEEE, 2005; 1940-1951.
    • (2005) , pp. 1940-1951
    • Zhang, Y.1    Liu, W.2    Lou, W.3
  • 30
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing. Proceedings of Crypto 2001, Lecture Notes in Computer Science, Vol. 2139, Springer
    • Boneh F. Identity-based encryption from the weil pairing. Proceedings of Crypto 2001, Lecture Notes in Computer Science, Vol. 2139, Springer, 2001; 213-219.
    • (2001) , pp. 213-219
    • Boneh, F.1
  • 31
    • 33749603013 scopus 로고    scopus 로고
    • Key revocation for identity-based schemes in mobile ad hoc networks. ADHOC-NOW, Lecture Notes in Computer Science, Vol. 4104, Kunz T, Ravi SS (eds). Springer
    • Hoeper K, Gong G. Key revocation for identity-based schemes in mobile ad hoc networks. ADHOC-NOW, Lecture Notes in Computer Science, Vol. 4104, Kunz T, Ravi SS (eds). Springer, 2006; 224-237.
    • (2006) , pp. 224-237
    • Hoeper, K.1    Gong, G.2
  • 32
    • 34548839108 scopus 로고    scopus 로고
    • Improved id-based security framework for ad-hoc network
    • Chien H, Lin R. Improved id-based security framework for ad-hoc network. Ad Hoc Networks 2008; 6: 47-60.
    • (2008) Ad Hoc Networks , vol.6 , pp. 47-60
    • Chien, H.1    Lin, R.2
  • 33
    • 84877881033 scopus 로고    scopus 로고
    • Authenticated identity-based encryption. Cryptology ePrint Archive, Report 2002/072 11 July .
    • Lynn B. Authenticated identity-based encryption. Cryptology ePrint Archive, Report 2002/072 11 July 2002.
    • (2002)
    • Lynn, B.1
  • 34
    • 84877898906 scopus 로고    scopus 로고
    • Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography. CRYPTO: Proceedings of Crypto
    • Boyen X. Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography. CRYPTO: Proceedings of Crypto, 2003.
    • (2003)
    • Boyen, X.1
  • 35
    • 51649122765 scopus 로고    scopus 로고
    • A secure routing protocol in proactive security approach for mobile ad-hoc networks. Wireless Communications and Networking Conference, IEEE
    • Zhao S, Aggarwal A, Liu S, Wu H. A secure routing protocol in proactive security approach for mobile ad-hoc networks. Wireless Communications and Networking Conference, IEEE, 2008; 2627-2632.
    • (2008) , pp. 2627-2632
    • Zhao, S.1    Aggarwal, A.2    Liu, S.3    Wu, H.4
  • 36
    • 84877879895 scopus 로고    scopus 로고
    • RFC3626-Optimized Link State Routing Protocol (OLSR) .
    • Clausen T, Jacquet P. RFC3626-Optimized Link State Routing Protocol (OLSR) 2003.
    • (2003)
    • Clausen, T.1    Jacquet, P.2
  • 37
    • 84877913704 scopus 로고    scopus 로고
    • Identity-based key exchange protocols for ad hoc networks. Proceedings of Canadian Workshop on Information Theory
    • Hoeper K, Gong G. Identity-based key exchange protocols for ad hoc networks. Proceedings of Canadian Workshop on Information Theory, 2005.
    • (2005)
    • Hoeper, K.1    Gong, G.2
  • 38
    • 84877890860 scopus 로고    scopus 로고
    • The design of Rijndael: AES-the Advanced Encryption Standard. Springer
    • Daemen J, Rijmen V. The design of Rijndael: AES-the Advanced Encryption Standard. Springer, 2002.
    • (2002)
    • Daemen, J.1    Rijmen, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.