메뉴 건너뛰기




Volumn 25, Issue 9, 2014, Pages 2211-2221

A lightweight encryption scheme for network-coded mobile Ad Hoc networks

Author keywords

energy saving; lightweight encryption; Mobile ad hoc networks; network coding

Indexed keywords

CODES (SYMBOLS); CRYPTOGRAPHY; ENERGY CONSERVATION; ENERGY UTILIZATION; NETWORK CODING;

EID: 84906094456     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2013.161     Document Type: Article
Times cited : (46)

References (35)
  • 2
    • 2442593140 scopus 로고    scopus 로고
    • Power-aware broadcasting in mobile ad hoc networks
    • S. Singh, C. Raghavendra, and J. Stepanek, "Power-Aware Broadcasting in Mobile Ad Hoc Networks," in Proc. IEEE PIMRC, 1999, pp. 1-10.
    • (1999) Proc. IEEE PIMRC , pp. 1-10
    • Singh, S.1    Raghavendra, C.2    Stepanek, J.3
  • 3
    • 0035361135 scopus 로고    scopus 로고
    • Algorithms for energy-efficient multicasting in static ad hoc wireless networks
    • June
    • J. Wieselthier, G. Nguyen, and A. Ephremides, "Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks," Mobile Netw. Appl., vol. 6, no. 3, pp. 251-263, June 2001.
    • (2001) Mobile Netw. Appl. , vol.6 , Issue.3 , pp. 251-263
    • Wieselthier, J.1    Nguyen, G.2    Ephremides, A.3
  • 4
    • 0036739784 scopus 로고    scopus 로고
    • Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks
    • Sept.
    • B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, "Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks," Wireless Netw., vol. 8, no. 5, pp. 481-494, Sept. 2002.
    • (2002) Wireless Netw. , vol.8 , Issue.5 , pp. 481-494
    • Chen, B.1    Jamieson, K.2    Balakrishnan, H.3    Morris, R.4
  • 6
    • 28844481518 scopus 로고    scopus 로고
    • Minimum-energy multicast in mobile ad hoc networks using network coding
    • Nov.
    • Y. Wu, P. Chou, and S. Kung, "Minimum-Energy Multicast in Mobile Ad Hoc Networks using Network Coding," IEEE Trans. Commun., vol. 53, no. 11, pp. 1906-1918, Nov. 2005.
    • (2005) IEEE Trans. Commun. , vol.53 , Issue.11 , pp. 1906-1918
    • Wu, Y.1    Chou, P.2    Kung, S.3
  • 7
    • 34548367677 scopus 로고    scopus 로고
    • A network coding approach to energy efficient broadcasting: From theory to practice
    • C. Fragouli, J. Widmer, and J. Boudec, "A Network Coding Approach to Energy Efficient Broadcasting: From Theory to Practice," in Proc. IEEE INFOCOM, 2006, pp. 1-11.
    • (2006) Proc. IEEE INFOCOM , pp. 1-11
    • Fragouli, C.1    Widmer, J.2    Boudec, J.3
  • 8
    • 34548314503 scopus 로고    scopus 로고
    • Network coding-based broadcast in mobile ad-hoc networks
    • L. Li, R. Ramjee, M. Buddhikot, and S.Miller, "Network Coding-Based Broadcast in Mobile Ad-Hoc Networks," in Proc. IEEE INFOCOM, 2007, pp. 1739-1747.
    • (2007) Proc. IEEE INFOCOM , pp. 1739-1747
    • Li, L.1    Ramjee, R.2    Buddhikot, M.3    Miller, S.4
  • 9
    • 33646382089 scopus 로고    scopus 로고
    • AStudy of the energy consumption characteristics of cryptographic algorithms and security protocols
    • Feb.
    • N.R. Potlapally, S. Ravi,A.Raghunathan, andN.K. Jha, "AStudy of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Trans. Mobile Comput., vol. 5, no. 2, pp. 128-143, Feb. 2006.
    • (2006) IEEE Trans. Mobile Comput. , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 10
    • 51249125036 scopus 로고    scopus 로고
    • Lightweight security for network coding
    • May
    • J.P. Vilela, L. Lima, and J. Barros, "Lightweight Security for Network Coding," in Proc. IEEE ICC, May 2008, pp. 1750-1754.
    • (2008) Proc. IEEE ICC , pp. 1750-1754
    • Vilela, J.P.1    Lima, L.2    Barros, J.3
  • 11
    • 70349682315 scopus 로고    scopus 로고
    • An efficient privacy-preserving scheme against traffic analysis in network coding
    • Apr.
    • Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An Efficient Privacy-Preserving Scheme Against Traffic Analysis in Network Coding," in Proc. IEEE INFOCOM, Apr. 2009, pp. 2213-2221.
    • (2009) Proc. IEEE INFOCOM , pp. 2213-2221
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Shen, X.4
  • 14
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • C.E. Shannon, "Communication Theory of Secrecy Systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 16
    • 0036353798 scopus 로고    scopus 로고
    • Secure network coding
    • June
    • N. Cai and R.W. Yeung, "Secure Network Coding," in Proc. IEEE ISIT, June 2002, pp. 323-329.
    • (2002) Proc. IEEE ISIT , pp. 323-329
    • Cai, N.1    Yeung, R.W.2
  • 18
    • 25644448947 scopus 로고    scopus 로고
    • Network coding for large scale file distribution
    • Mar.
    • C. Gkantsidis and P. Rodriguez, "Network Coding for Large Scale File Distribution," in Proc. IEEE INFOCOM, Mar. 2005, pp. 2235-2245.
    • (2005) Proc. IEEE INFOCOM , pp. 2235-2245
    • Gkantsidis, C.1    Rodriguez, P.2
  • 21
    • 0028755308 scopus 로고
    • Automated cryptanalysis of transposition ciphers
    • J. Giddy and R. Safavi-Naini, "Automated Cryptanalysis of Transposition Ciphers," Comput. J., vol. 37, no. 5, pp. 429-436, 1994.
    • (1994) Comput. J. , vol.37 , Issue.5 , pp. 429-436
    • Giddy, J.1    Safavi-Naini, R.2
  • 22
    • 84872385561 scopus 로고    scopus 로고
    • Making the most of two heuristics: Breaking transposition ciphers with ants
    • M.D. Russell, J.A. Clark, and S. Stepney, "Making the Most of Two Heuristics: Breaking Transposition Ciphers with Ants," in Proc. Congr. Evol. Comput., 2003, pp. 2653-2658.
    • (2003) Proc. Congr. Evol. Comput. , pp. 2653-2658
    • Russell, M.D.1    Clark, J.A.2    Stepney, S.3
  • 23
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuocity classes
    • May
    • P. Paillier, "Public-Key Cryptosystems based on Composite Degree Residuocity Classes," in Proc. EUROCRYPT, May 1999, pp. 233-238.
    • (1999) Proc. EUROCRYPT , pp. 233-238
    • Paillier, P.1
  • 24
    • 84873848488 scopus 로고    scopus 로고
    • [Online]. Available
    • The OpenSSL project. [Online]. Available: http://www.openssl.org/
    • The OpenSSL Project
  • 25
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security (Final)
    • Glenwood, MD, USA, DARPA Proj. Rep.
    • D.W. Carman, P.S. Kruus, and B.J. Matt, "Constraints and approaches for distributed sensor network security (Final)," NAI Labs, Glenwood, MD, USA, DARPA Proj. Rep., 2000.
    • (2000) NAI Labs
    • Carman, D.W.1    Kruus, P.S.2    Matt, B.J.3
  • 27
    • 0036948878 scopus 로고    scopus 로고
    • Minimum-energy broadcast in all-wireless networks: Np-completeness and distribution issues
    • M. Cagalj, J. Hubaux, and C. Enz, "Minimum-Energy Broadcast in All-Wireless Networks: Np-Completeness and Distribution Issues," in Proc. ACM MobiCom, 2002, pp. 172-182.
    • (2002) Proc. ACM MobiCom , pp. 172-182
    • Cagalj, M.1    Hubaux, J.2    Enz, C.3
  • 28
    • 51649118865 scopus 로고    scopus 로고
    • Random linear network coding: A free cypher?
    • June
    • L. Lima, M. Médard, and J. Barros, "Random Linear Network Coding: A Free Cypher?," in Proc. IEEE ISIT, June 2007, pp. 546-550.
    • (2007) Proc. IEEE ISIT , pp. 546-550
    • Lima, L.1    Médard, M.2    Barros, J.3
  • 29
    • 77953316768 scopus 로고    scopus 로고
    • Optimal linear network coding design for secure unicast with multiple streams
    • Mar.
    • J. Wang, J. Wang, K. Lu, B. Xiao, and N. Gu, "Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Wang, J.1    Wang, J.2    Lu, K.3    Xiao, B.4    Gu, N.5
  • 31
    • 4143131440 scopus 로고    scopus 로고
    • Distributed symmetric key management for mobile ad hoc networks
    • A.-F. Chan, "Distributed Symmetric Key Management for Mobile Ad Hoc Networks," in Proc. IEEE INFOCOM, 2004, pp. 2414-2424.
    • (2004) Proc. IEEE INFOCOM , pp. 2414-2424
    • Chan, A.-F.1
  • 32
    • 34147173361 scopus 로고    scopus 로고
    • A survey on peerto-peer key management for mobile ad hoc networks
    • J.V.D. Merwe, D. Dawoud, and S. McDonald, "A Survey on Peerto-Peer Key Management for Mobile Ad Hoc Networks," ACM Comput. Surveys, vol. 39, no. 1, pp. 3-45, 2007.
    • (2007) ACM Comput. Surveys , vol.39 , Issue.1 , pp. 3-45
    • Merwe, J.V.D.1    Dawoud, D.2    McDonald, S.3
  • 33
    • 36749056448 scopus 로고    scopus 로고
    • R2: Random push with random network coding in live peer-to-peer streaming
    • Dec.
    • M. Wang and B. Li, "R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming," IEEE J. Sel. Areas Commun., vol. 25, no. 9, pp. 1655-1666, Dec. 2007.
    • (2007) IEEE J. Sel. Areas Commun. , vol.25 , Issue.9 , pp. 1655-1666
    • Wang, M.1    Li, B.2
  • 34
    • 85077127142 scopus 로고    scopus 로고
    • NCCloud: Applying network coding for the storage repair in a cloud-of-clouds
    • Y. Hu, H.C. Chen, P.P. Lee, and Y. Tang, "NCCloud: Applying Network Coding for the Storage Repair in a Cloud-Of-Clouds," in Proc. USENIX FAST, 2012, p. 21.
    • (2012) Proc. USENIX FAST , pp. 21
    • Hu, Y.1    Chen, H.C.2    Lee, P.P.3    Tang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.