Securing ad hoc networks

作者: Lidong Zhou , Z.J. Haas

DOI: 10.1109/65.806983

关键词:

摘要: … networks is their vulnerability to security attacks. In this article, we study the threats an ad hoc network … We identiFy the new challenges and opportunities posed by this new networking …

参考文章(45)
Butler Lampson, Morrie Gasser, Andy Goldstein, Charlie Kaufman, The Digital Distributed System Security Architecture National Institute of Standards and Technology. ,(1989)
F. W. Ellersick, C. E. Cook, Donald L. Schilling, L. B. Milstein, Spread-Spectrum Communications Encyclopedia of Wireless and Mobile Communications. pp. 1711- 1719 ,(1983) , 10.1081/E-EWMC2-120043935
Radia Joy Perlman, Network layer protocols with byzantine robustness Massachusetts Institute of Technology. ,(1988)
Chai-Keong Toh, Associativity-Based Routing for Ad Hoc Mobile Networks Wireless Personal Communications. ,vol. 4, pp. 103- 139 ,(1997) , 10.1023/A:1008812928561
Stanisław Jarecki, Proactive secret sharing and public key cryptosystems Massachusetts Institute of Technology. ,(1995)
J. Sharony, A mobile radio network architecture with dynamically changing topology using virtual subnets international conference on communications. ,vol. 2, pp. 807- 812 ,(1996) , 10.1109/ICC.1996.541292
P. Muhlethaler, Thomas Heide Clausen, P. Jacquet, A. Qayyum, A. Laouiti, L. Viennot, Optimized Link State Routing Protocol ,(2000)
Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright, The &Ω key management service Journal of Computer Security. ,vol. 4, pp. 267- 287 ,(1996) , 10.3233/JCS-1996-4402
D. Malkhi, M.K. Reiter, Secure and scalable replication in Phalanx symposium on reliable distributed systems. pp. 51- 58 ,(1998) , 10.1109/RELDIS.1998.740474
Rosario Gennaro, Stanisław Jarecki, Hugo Krawczyk, Tal Rabin, Robust threshold DSS signatures theory and application of cryptographic techniques. pp. 354- 371 ,(1996) , 10.1007/3-540-68339-9_31