메뉴 건너뛰기




Volumn , Issue , 2010, Pages 117-142

Routing security in Ad Hoc wireless networks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84891993846     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-0-387-73821-5_6     Document Type: Chapter
Times cited : (18)

References (26)
  • 1
    • 84892079749 scopus 로고    scopus 로고
    • J. Barkley, NIST Special Publication: Symmetric Key Cryptography, http://csrc.nist.gov/publications/nistpubs/800-7/node208.html
    • Barkley, J.1
  • 4
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key pre-distribution scheme for wireless sensor networks
    • Oct
    • W. Du, J. Deng, Y. S. Han, and P. K. Varshney, A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks, ACM CCS 2003, Oct. 2003, pp. 42-51.
    • (2003) ACM CCS 2003 , pp. 42-51
    • Du, W.1    Deng, J.2    Han, Y.S.3    Varshney, P.K.4
  • 5
    • 0031381841 scopus 로고    scopus 로고
    • The routing algorithm for the reconfigurable wireless networks
    • Oct
    • Z. J. Haas, The Routing Algorithm for the Reconfigurable Wireless Networks, Proc. of ICUPC 1997, Vol 2, Oct. 1997, pp. 562-566.
    • (1997) Proc. of ICUPC 1997 , vol.2 , pp. 562-566
    • Haas, Z.J.1
  • 7
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y.-C. Hu, D. B. Johnson, and A. Perrig, Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Mobicom'02, 2002.
    • (2002) Mobicom'02
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 8
    • 3042667172 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • Y.-C. Hu, D. B. Johnson, and A. Perrig, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, WiSe 2003, 2003.
    • (2003) WiSe 2003
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 10
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks, Infocom 2003.
    • (2003) Infocom
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 11
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Kluwer, Dordrecht
    • D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, Kluwer, Dordrecht, Vol 353, 1996, pp. 153-181.
    • (1996) Mobile Computing , vol.353 , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 17
    • 0031353437 scopus 로고    scopus 로고
    • A highly adaptive distributed routing algorithm for mobile wireless networks
    • Apr
    • V. D. Park and M. S. Corson, A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, IEEE Infocom 1997, Apr. 1997, pp. 1405-1413.
    • (1997) IEEE Infocom 1997 , pp. 1405-1413
    • Park, V.D.1    Corson, M.S.2
  • 25
    • 0036498659 scopus 로고    scopus 로고
    • The broadcast storm problem in a mobile ad hoc network
    • Mar
    • Y.-C. Tseng, S.-Y. Ni, Y.-S. Chen, and J.-P. Sheu, The Broadcast Storm Problem in a Mobile Ad Hoc Network, ACM Wireless Networks, Vol 8, No 2, Mar. 2002, pp. 153-167.
    • (2002) ACM Wireless Networks , vol.8 , Issue.2 , pp. 153-167
    • Tseng, Y.-C.1    Ni, S.-Y.2    Chen, Y.-S.3    Sheu, J.-P.4
  • 26
    • 11944253975 scopus 로고    scopus 로고
    • A generic distributed broadcast scheme in ad hoc wireless networks
    • Oct
    • J. Wu and F. Dai, A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks, IEEE Transactions on Computers, Vol 53, No 10, Oct. 2004, pp. 1343-1354.
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.10 , pp. 1343-1354
    • Wu, J.1    Dai, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.