Hybrid Cryptographic Public Key Infrastructure Framework for Scalable Manets
Abstract
Keywords
Full Text:
PDFReferences
C. E. Perkins, Ad hoc Networking, Addison-Wesley, San Francisco, CA, 2001.
V. Karpijoki, “Security in Ad Hoc Networks,”
D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, Kluwer Academic Publishers, Vol 353, 1996, pp. 153-181.
Stephen Carter and Alec Yasinsac, Secure Position Aided Ad hoc Routing Protocol. Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), Nov 3-4, 2002
C. S. R. Murthy and B. S. Manoj, Ad Hoc Wireless Networks: Architectures and Protocols, Prentice Hall PTR, 2004.
Z. J. Haas, The Routing Algorithm for the Reconfigurable Wireless Networks, Proc. of ICUPC 1997, Vol 2, Oct. 1997, pp. 562-566.
W. Stallings, Cryptography and Network Security: Principles and Practice (2nd ed.), Prentice Hall, Inc., Upper Saddle River, NJ, 1999.
BOSE, P., MORIN, P., STOJMENOVIC, I. & URRUTIA, J. (2001) Routing with GuAuthenticated route discovery for adhoc networksteed Delivery in Ad Hoc Wireless Networks. Wireless Networks, 7, 609- 616.
Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc networks,” Proc. 6th Int’l. Conf. Mobile Comp. Net., MobiCom 2000, Aug. 2000, pp. 275–83.
David C. Plummer. An Ethernet Address Resolution Protocol: Or Converting Network Protocol Address to 48.bit Ethernet Addresses for Transmission on Ethernet Hardware. RFC 826, November 1982.
DavidA.Maltz, JoshBroch, and David B. Johnson. Experiences Designing andBuilding a Multi-Hop Wireless Ad Hoc Network Testbed. Technical Report 99-116, School of Computer Science, Carnegie Mellon University, March 1999. Available from http://www.monarch.cs.cmu.edu/papers.html.
E.M. Gafni and D.P. Bertsekas. Distributed algorithms for generating loop-free routes in networks with frequently changing topology. IEEE Transactions on Communications, 29(1):11–18, January 1981.
S. Murphy, “Routing Protocol Threat Analysis,” Internet Draft, draft-murphy-threat-00.txt, October 2002.
Y.-C. Hu, A. Perrig, and D.B. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad hoc Networks,” Proc. 22nd Annual Joint Conf. IEEE Computer and Communications Societies (Infocom’03), San Francisco, CA, April 2003.
Black mail [21] Y.-C. Hu, D.B. Johnson, and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks,” Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002, pp. 3-13.
Y. Hu, D. Johnson, and A. Perrig, “Sead: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,” IEEE WMCSA, 2002.
S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc Networks,” Proc. 6th Annual ACM/IEEE Int’l. Conf. Mobile Computing and Networking (Mobicom’00), Boston, Massachusetts, August 2000, pp. 255-265.
S. Yi, P. Naldurg, and R. Kravets Security-Aware Ad hoc Routing for Wireless Networks The Second ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc'01), 2001.(another version Security-Aware Ad Hoc Routing Protocol for Wireless Networks, Report, August, 2001)
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.