메뉴 건너뛰기




Volumn 27, Issue 11, 2014, Pages 2808-2831

Secure multicast routing protocols in mobile ad-hoc networks

Author keywords

Mobile ad hoc network (MANET); Mobile node (MN); Multicast routing attacks; Multicast routing protocols (MRP); Security techniques; Survey

Indexed keywords

INTERNET PROTOCOLS; MOBILE AD HOC NETWORKS; MOBILE SECURITY; MULTICASTING; NETWORK ROUTING; ROUTING PROTOCOLS; SURVEYING; SURVEYS;

EID: 84911951617     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.2508     Document Type: Review
Times cited : (22)

References (51)
  • 1
    • 33751187622 scopus 로고    scopus 로고
    • Wireless ad hoc networks: Technologies and challenges: Editorials
    • Younis M, Ozer SZ. Wireless ad hoc networks: technologies and challenges: editorials. Wireless Communications & Mobile Computing 2006; 6(7):889-892.
    • (2006) Wireless Communications & Mobile Computing , vol.6 , Issue.7 , pp. 889-892
    • Younis, M.1    Ozer, S.Z.2
  • 2
    • 0038099200 scopus 로고    scopus 로고
    • Topology control and routing in ad hoc networks: A survey
    • Rajaraman R. Topology control and routing in ad hoc networks: a survey. SIGACT News 2002; 33(2):60-73.
    • (2002) SIGACT News , vol.33 , Issue.2 , pp. 60-73
    • Rajaraman, R.1
  • 3
    • 33947228000 scopus 로고    scopus 로고
    • Qos multicast routing by using multiple paths/trees in wireless ad hoc networks
    • Wu H, Jia X. Qos multicast routing by using multiple paths/trees in wireless ad hoc networks. Ad Hoc Networks 2007; 5(5):600-612.
    • (2007) Ad Hoc Networks , vol.5 , Issue.5 , pp. 600-612
    • Wu, H.1    Jia, X.2
  • 4
    • 77949576799 scopus 로고    scopus 로고
    • A load balancing energy efficient clustering algorithm for MANETs
    • Safa H, Mirza O. A load balancing energy efficient clustering algorithm for MANETs. International Journal of Communication Systems 2010; 23(4):463-483. Available from: http://dx.doi.org/10.1002/dac.1084.
    • (2010) International Journal of Communication Systems , vol.23 , Issue.4 , pp. 463-483
    • Safa, H.1    Mirza, O.2
  • 5
    • 39649101946 scopus 로고    scopus 로고
    • Research on multicast routing protocols for mobile ad-hoc networks
    • Junhai L, Liu X, Danxia Y. Research on multicast routing protocols for mobile ad-hoc networks. Computer Networks 2008; 52(5):988-997.
    • (2008) Computer Networks , vol.52 , Issue.5 , pp. 988-997
    • Junhai, L.1    Liu, X.2    Danxia, Y.3
  • 6
    • 79957937447 scopus 로고    scopus 로고
    • OMAC: A new access control architecture for overlay multicast communications
    • Mohamed EE, Barka E. OMAC: a new access control architecture for overlay multicast communications. International Journal of Communication Systems 2011; 24(6):761-775. Available from: http://dx.doi.org/10.1002/dac. 1185.
    • (2011) International Journal of Communication Systems , vol.24 , Issue.6 , pp. 761-775
    • Mohamed, E.E.1    Barka, E.2
  • 7
    • 84855316718 scopus 로고    scopus 로고
    • Qos multicast routing in cognitive radio ad hoc networks
    • Xie L, Jia X, Zhou K. Qos multicast routing in cognitive radio ad hoc networks. International Journal of Communication Systems 2012; 25(1):30-46. Available from: http://dx.doi.org/10.1002/dac.1285.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.1 , pp. 30-46
    • Xie, L.1    Jia, X.2    Zhou, K.3
  • 8
    • 70349194716 scopus 로고    scopus 로고
    • Multicast routing protocols in mobile ad hoc networks: A comparative survey and taxonomy
    • Badarneh OS, Kadoch M. Multicast routing protocols in mobile ad hoc networks: a comparative survey and taxonomy. EURASIP Journal on Wireless Communications and Networking 2009; 2009:26:1-26:42. Available from: http://dx.doi.org/10.1155/2009/764047.
    • (2009) EURASIP Journal on Wireless Communications and Networking , vol.2009 , pp. 261-2642
    • Badarneh, O.S.1    Kadoch, M.2
  • 10
    • 84860659191 scopus 로고    scopus 로고
    • Mobile device integration of a fingerprint biometric remote authentication scheme
    • Chen C-L, Lee C-C, Hsu C-Y. Mobile device integration of a fingerprint biometric remote authentication scheme. International Journal of Communication Systems 2012; 25(5):585-597. Available from: http://dx.doi.org/10.1002/dac.1277.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.5 , pp. 585-597
    • Chen, C.-L.1    Lee, C.-C.2    Hsu, C.-Y.3
  • 11
    • 84860700540 scopus 로고    scopus 로고
    • Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions
    • Chen R-M, Hsieh K-T. Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions. International Journal of Communication Systems 2012; 25(5):672-688. Available from: http://dx.doi.org/10.1002/dac.1289.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.5 , pp. 672-688
    • Chen, R.-M.1    Hsieh, K.-T.2
  • 12
    • 84859165094 scopus 로고    scopus 로고
    • Cryptanalysis of mCryptonA lightweight block cipher for security of RFID tags and sensors
    • Mala H, Dakhilalian M, Shakiba M. Cryptanalysis of mCryptonA lightweight block cipher for security of RFID tags and sensors. International Journal of Communication Systems 2012; 25(4):415-426. Available from: http://dx.doi.org/10.1002/dac.1248.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.4 , pp. 415-426
    • Mala, H.1    Dakhilalian, M.2    Shakiba, M.3
  • 13
    • 84857647179 scopus 로고    scopus 로고
    • Server-less RFID authentication and searching protocol with enhanced security
    • Lee C-F, Chien H-Y, Laih C-S. Server-less RFID authentication and searching protocol with enhanced security. International Journal of Communication Systems 2012; 25(3):376-385. Available from: http://dx.doi.org/10.1002/dac.1246.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.3 , pp. 376-385
    • Lee, C.-F.1    Chien, H.-Y.2    Laih, C.-S.3
  • 14
    • 80052632132 scopus 로고    scopus 로고
    • A pairing-free certificateless authenticated key agreement protocol
    • He D, Chen J, Hu J. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems 2012; 25(2):221-230. Available from: http://dx.doi.org/10.1002/dac.1265.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.2 , pp. 221-230
    • He, D.1    Chen, J.2    Hu, J.3
  • 15
    • 73849138981 scopus 로고    scopus 로고
    • Performance of joint multilevel/AES-LDPCC-CPFSK schemes over wireless sensor networks
    • Cam H, Ucan ON, Odabasioglu N, Sonmez AC. Performance of joint multilevel/AES-LDPCC-CPFSK schemes over wireless sensor networks. International Journal of Communication Systems 2010; 23(1):77-90. Available from: http://dx.doi.org/10.1002/dac.1047.
    • (2010) International Journal of Communication Systems , vol.23 , Issue.1 , pp. 77-90
    • Cam, H.1    Ucan, O.N.2    Odabasioglu, N.3    Sonmez, A.C.4
  • 16
    • 79952059658 scopus 로고    scopus 로고
    • Lightweight and provably secure user authentication with anonymity for the global mobility network
    • Chen C, He D, Chan S, Bu J, Gao Y, Fan R. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2011; 24(3):347-362. Available from: http://dx.doi.org/10.1002/dac.1158.
    • (2011) International Journal of Communication Systems , vol.24 , Issue.3 , pp. 347-362
    • Chen, C.1    He, D.2    Chan, S.3    Bu, J.4    Gao, Y.5    Fan, R.6
  • 18
    • 36348984836 scopus 로고    scopus 로고
    • Security in wireless ad hoc networks
    • Ilyas M, Dorf RC (eds) CRC Press, Inc.: Boca Raton, FL, USA
    • Mishra A, Nadkarni KM. Security in wireless ad hoc networks. In The Handbook of Ad Hoc Wireless Networks, Ilyas M, Dorf RC (eds). CRC Press, Inc.: Boca Raton, FL, USA, 2003; 499-549.
    • (2003) The Handbook of Ad Hoc Wireless Networks , pp. 499-549
    • Mishra, A.1    Nadkarni, K.M.2
  • 20
    • 84859161671 scopus 로고    scopus 로고
    • Towards generalized id-based user authentication for mobile multi-server environment
    • Chuang Y-H, Tseng Y-M. Towards generalized id-based user authentication for mobile multi-server environment. International Journal of Communication Systems 2012; 25(4):447-460. Available from: http://dx.doi.org/10.1002/dac.1268.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.4 , pp. 447-460
    • Chuang, Y.-H.1    Tseng, Y.-M.2
  • 21
    • 33845506425 scopus 로고    scopus 로고
    • Fisheye zone routing protocol: A multi-level zone routing protocol for mobile ad hoc networks
    • Yang C-C, Tseng L-P. Fisheye zone routing protocol: A multi-level zone routing protocol for mobile ad hoc networks. Computer Communications 2007; 30(2):261-268.
    • (2007) Computer Communications , vol.30 , Issue.2 , pp. 261-268
    • Yang, C.-C.1    Tseng, L.-P.2
  • 24
    • 34548827597 scopus 로고    scopus 로고
    • A study of different types of attacks on multicast in mobile ad hoc networks
    • Nguyen HL, Nguyen UT. A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks 2008; 6(1):32-46. ISSN 1570-8705, DOI: 10.1016/j.adhoc.2006.07.005.
    • (2008) Ad Hoc Networks , vol.6 , Issue.1 , pp. 32-46
    • Nguyen, H.L.1    Nguyen, U.T.2
  • 33
    • 18144391542 scopus 로고    scopus 로고
    • Foundations of security for hash chains in ad hoc networks
    • Bradford PG, Gavrylyako OV. Foundations of security for hash chains in ad hoc networks. Cluster Computing 2005; 8:189-195. Available from: http://portal.acm.org/citation.cfm?id=1058043.1058061.
    • (2005) Cluster Computing , vol.8 , pp. 189-195
    • Bradford, P.G.1    Gavrylyako, O.V.2
  • 35
    • 60949084324 scopus 로고    scopus 로고
    • BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks
    • Curtmola R, Nita-Rotaru C. BSMR: byzantine-resilient secure multicast routing in multihop wireless networks. IEEE Transactions on Mobile Computing 2009; 8:445-459. Available from: http://dx.doi.org/10.1109/TMC. 2008.134.
    • (2009) IEEE Transactions on Mobile Computing , vol.8 , pp. 445-459
    • Curtmola, R.1    Nita-Rotaru, C.2
  • 36
    • 84911979862 scopus 로고    scopus 로고
    • NATO IST-083: Symposium on Military Communication with a Special Focus on Tactical Communications, Prague, Czech Republic
    • Bongartz HH-J, Ginzler T, Bachran T, Tuset P. SEAMAN: a security-enabled anonymous MANET protocol. In NATO IST-083: Symposium on Military Communication with a Special Focus on Tactical Communications, Prague, Czech Republic, 2008.
    • (2008) SEAMAN: A Security-enabled Anonymous MANET Protocol
    • Hh-J, B.1    Ginzler, T.2    Bachran, T.3    Tuset, P.4
  • 38
    • 28044452892 scopus 로고    scopus 로고
    • Application versus network layer multicasting in ad hoc networks: The alma routing protocol
    • Ge M, Krishnamurthy SV, Faloutsos M. Application versus network layer multicasting in ad hoc networks: the alma routing protocol. Ad Hoc Networks 2006; 4(2):283-300.
    • (2006) Ad Hoc Networks , vol.4 , Issue.2 , pp. 283-300
    • Ge, M.1    Krishnamurthy, S.V.2    Faloutsos, M.3
  • 40
    • 33847356523 scopus 로고    scopus 로고
    • Optimization technique for military multicast key management
    • IEEE: Atlantic City
    • Aurisch T. Optimization technique for military multicast key management. In Unclassified Proceedings of the IEEE MILCOM, Vol. 4. IEEE: Atlantic City, 2005; 2570-2576.
    • (2005) Unclassified Proceedings of the IEEE MILCOM , vol.4 , pp. 2570-2576
    • Aurisch, T.1
  • 42
    • 78651563017 scopus 로고    scopus 로고
    • A reliable multicast routing protocol for highspeed mobile ad hoc networks: R-ODMRP
    • Zhiming X, Yu W, Jingguo Z. A reliable multicast routing protocol for highspeed mobile ad hoc networks: R-ODMRP. Journal of Software 2009; 5(1):20-27.
    • (2009) Journal of Software , vol.5 , Issue.1 , pp. 20-27
    • Zhiming, X.1    Yu, W.2    Jingguo, Z.3
  • 45
    • 84870660405 scopus 로고    scopus 로고
    • Dynamic clustering for QoS based secure multicast key distribution in mobile ad hoc networks
    • Devaraju S, Ganapathi P. Dynamic clustering for QoS based secure multicast key distribution in mobile ad hoc networks. IJCSI International Journal of Computer Science 2010; 7(1-2):30-37.
    • (2010) IJCSI International Journal of Computer Science , vol.7 , Issue.1-2 , pp. 30-37
    • Devaraju, S.1    Ganapathi, P.2
  • 47
    • 0036924499 scopus 로고    scopus 로고
    • On-demand multicast routing protocol in multihop wireless mobile networks
    • Lee SJ, Su W, Gerla M. On-demand multicast routing protocol in multihop wireless mobile networks. Mobile Networks and Applications 2002; 7(6):441-453. Available from: http://dx.doi.org/10.1023/A:1020756600187.
    • (2002) Mobile Networks and Applications , vol.7 , Issue.6 , pp. 441-453
    • Lee, S.J.1    Su, W.2    Gerla, M.3
  • 51
    • 33748564921 scopus 로고    scopus 로고
    • A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
    • Xenakis C, Laoutaris N, Merakos L, Stavrakakis I. A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms. Computer Networks 2006; 50(17):3225-3241.
    • (2006) Computer Networks , vol.50 , Issue.17 , pp. 3225-3241
    • Xenakis, C.1    Laoutaris, N.2    Merakos, L.3    Stavrakakis, I.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.