Wireless networking security: open issues in trust, management, interoperation and measurement
暂无分享,去创建一个
[1] Joseph P. Macker,et al. Internet-Based Mobile Ad Hoc Networking , 1999, IEEE Internet Comput..
[2] Jean-Pierre Hubaux,et al. A Fair Scheduling for Wireless Mesh Networks , 2005 .
[3] Haiyun Luo,et al. Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..
[4] Christian Damsgaard Jensen,et al. Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .
[5] John S. Baras,et al. Ant-based adaptive trust evidence distribution in MANET , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[6] Paramvir Bahl,et al. Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks , 2001, PODC '01.
[7] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[8] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[9] Chita R. Das,et al. A novel caching scheme for improving Internet-based mobile ad hoc networks performance , 2006, Ad Hoc Networks.
[10] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[11] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.
[12] Randy H. Katz,et al. Secure Authentication System for Public WLAN Roaming , 2005, Mob. Networks Appl..
[13] Shambhu Upadhyaya,et al. Securing Information through Trust Management in Wireless Networks , 2004 .
[14] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[15] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[16] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[17] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[18] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[19] Li Li,et al. IP-based access network infrastructure for next-generation wireless data networks , 2000, IEEE Wirel. Commun..
[20] Ying-Dar Lin,et al. Multihop cellular: a new architecture for wireless communications , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[21] A. Tomlinson,et al. Security challenges in the personal distributed environment , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[22] Jun-Hong Cui,et al. Reducing multicast traffic load for cellular networks using ad hoc networks , 2006, IEEE Trans. Veh. Technol..
[23] Xuemin Shen,et al. IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks , 2004, IEEE Wireless Communications.
[24] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[25] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[26] Georgios Kambourakis,et al. Performance Evaluation of Public Key-Based Authentication in Future Mobile Communication Systems , 2004, EURASIP J. Wirel. Commun. Netw..
[27] Patrick Maillé. Allowing multi-hops in cellular networks: an economic analysis , 2005, MSWiM '05.
[28] J. Baras,et al. Autonomous Trust Establishment 1 , 2005 .
[29] Wei Liang,et al. Integration of authentication and mobility management in third generation and WLAN data networks , 2005, Wirel. Commun. Mob. Comput..
[30] Lichun Bao,et al. Personal AP protocol for mobility management in IEEE 802.11 systems , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[31] Ness B. Shroff,et al. Transmission scheduling for efficient wireless utilization , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[32] Thomas F. La Porta,et al. Exploiting open functionality in SMS-capable cellular networks , 2008, J. Comput. Secur..
[33] David Levin,et al. Survivable mobile wireless networks: issues, challenges, and research directions , 2002, WiSE '02.
[34] Jiejun Kong,et al. Providing Multi-layer Security Support for Wireless Communications across Multiple Trusted Domains , 2022 .
[35] P. Lamsal. Understanding Trust and Security , 2001 .
[36] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[37] Randy H. Katz,et al. Host Mobility Using an Internet Indirection Infrastructure , 2005, Wirel. Networks.
[38] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[39] Haiyun Luo,et al. UCAN: a unified cellular and ad-hoc network architecture , 2003, MobiCom '03.
[40] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[41] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[42] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[43] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[44] T. Dierks,et al. The TLS protocol , 1999 .
[45] Donald F. Towsley,et al. Comparison of inter-area rekeying algorithms for secure wireless group communications , 2002, Perform. Evaluation.
[46] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[47] Markus Jakobsson,et al. A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks , 2003, Financial Cryptography.
[48] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.
[49] Dirk Westhoff,et al. Charging support for ad hoc stub networks , 2003, Comput. Commun..
[50] Randeep Bhatia,et al. ICAM: integrated cellular and ad hoc multicast , 2006, IEEE Transactions on Mobile Computing.
[51] Bernard Aboba,et al. Proxy Chaining and Policy Implementation in Roaming , 1999, RFC.
[52] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[53] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[54] Brian L. Mark,et al. A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.
[55] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[56] TowsleyDon,et al. Comparison of inter-area rekeying algorithms for secure wireless group communications , 2002 .
[57] Bharat K. Bhargava,et al. Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA) , 2004, Mob. Networks Appl..
[58] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[59] Vaduvur Bharghavan,et al. Challenges and Solutions to Adaptive Computing and Seamless Mobility over Heterogeneous Wireless Networks , 1997, Wirel. Pers. Commun..
[60] Randy H. Katz,et al. Emerging challenges: Mobile networking for “Smart Dust” , 2000, Journal of Communications and Networks.
[61] Licia Capra,et al. Engineering human trust in mobile system collaborations , 2004, SIGSOFT '04/FSE-12.
[62] Adi Shamir,et al. How to share a secret , 1979, CACM.
[63] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[64] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[65] John Lee,et al. Integration of IP mobility and security for secure wireless communications , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[66] Barbara E. Bullock,et al. Best Current Practices for Wireless Internet Service Provider (WISP) Roaming , 2002 .
[67] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[68] M. Riguidel,et al. Security architecture for heterogeneous distributed computing systems , 2004, 38th Annual 2004 International Carnahan Conference on Security Technology, 2004..
[69] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[70] David E. Culler,et al. System architecture directions for networked sensors , 2000, SIGP.
[71] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[72] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[73] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[74] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[75] Jun Li,et al. Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support , 2002, MOCO.
[76] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[77] Chunming Qiao,et al. Integrated cellular and ad hoc relaying systems: iCAR , 2001, IEEE J. Sel. Areas Commun..
[78] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[79] Wade Trappe,et al. An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.
[80] Tao Jiang,et al. Cooperative games, phase transitions on graphs and distributed trust in MANET , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[81] Chung-wei Lee,et al. Trust based adaptive on demand ad hoc routing protocol , 2004, ACM-SE 42.
[82] Haiyun Luo,et al. Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .
[83] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[84] Markus Jakobsson,et al. A charging and rewarding scheme for packet forwarding in multi-hop cellular networks , 2003, MobiHoc '03.