A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions
暂无分享,去创建一个
[1] Yi-Bing Lin,et al. Adaptive algorithms for reducing PCS network authentication traffic , 1997 .
[2] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[3] Stephen B. Wicker,et al. Game theory and the design of self-configuring, adaptive wireless networks , 2001, IEEE Commun. Mag..
[4] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[5] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[6] Nitin H. Vaidya,et al. Preventing traffic analysis in packet radio networks , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[7] William Stallings,et al. Cryptography and network security (2nd ed.): principles and practice , 1998 .
[8] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[9] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[10] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[11] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[12] Levente Buttyán,et al. Rational Exchange - A Formal Model Based on Game Theory , 2001, WELCOM.
[13] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[14] André Weimerskirch,et al. A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.
[15] Zygmunt J. Haas,et al. The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .
[16] Yuguang Fang,et al. Fast collision resolution (FCR) MAC algorithm for wireless local area networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[17] Jerzy Konorski,et al. Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting , 2001, PROMS.
[18] Robbert van Renesse,et al. COCA: a secure distributed online certification authority , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[19] Anish Mathuria,et al. Key establishment protocols for secure mobile communications: a critical survey , 2000, Comput. Commun..
[20] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[21] Armando Fox,et al. Security on the move: indirect authentication using Kerberos , 1996, MobiCom '96.
[22] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[23] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[24] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[25] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[26] Dharma P. Agrawal,et al. Strategies for enhancing routing security in protocols for mobile ad hoc networks , 2003, J. Parallel Distributed Comput..
[27] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[28] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[29] J.-Y. Le Boudec,et al. Toward self-organized mobile ad hoc networks: the terminodes project , 2001, IEEE Commun. Mag..
[30] Sandeep Kumar,et al. A Software Architecture to Support Misuse Intrusion Detection , 1995 .
[31] Robin Kravets,et al. Key management for heterogeneous ad hoc wireless networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[32] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[33] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[34] Adi Shamir,et al. How to share a secret , 1979, CACM.
[35] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[36] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[37] Brian D. Noble,et al. Zero-interaction authentication , 2002, MobiCom '02.
[38] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[39] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[40] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[41] Riccardo Bettati,et al. IEEE TRANSACTIONS ON SYSTEMS , MAN , AND CYBERNETICS — PART A : SYSTEMS AND HUMANS , 2001 .
[42] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[43] Janelle J. Harms,et al. Performance study of a multipath routing method for wireless mobile ad hoc networks , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[44] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[45] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[46] Yi-Bing Lin,et al. Reducing authentication signaling traffic in third-generation mobile network , 2003, IEEE Trans. Wirel. Commun..
[47] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[48] Birgit Pfitzmann,et al. Trusting Mobile User Devices and Security Modules , 1997, Computer.
[49] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[50] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[51] Richard E. Newman,et al. High level prevention of traffic analysis , 1991, Proceedings Seventh Annual Computer Security Applications Conference.
[52] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[53] Jerzy Konorski,et al. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations , 2002, NETWORKING.
[54] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[55] S. Buchegger,et al. Cooperation of Nodes. In: L. Buttyan and J.-P. Hubaux (eds.), Report on a Working Session on Security in Wireless Ad Hoc Networks , 2002 .
[56] Zygmunt J. Haas,et al. Multipath routing in the presence of frequent topological changes , 2001, IEEE Commun. Mag..
[57] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[58] Refik Molva,et al. IDAMN: An Intrusion Detection Architecture for Mobile Networks , 1997, IEEE J. Sel. Areas Commun..
[59] Nitin H. Vaidya,et al. A dynamic mix method for wireless ad hoc networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[60] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[61] Yuguang Fang,et al. A multipath routing approach for secure data delivery , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[62] Gabriel Montenegro,et al. Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.
[63] Srdjan Capkun,et al. Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..
[64] David A. Maltz,et al. The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks , 1999, IEEE J. Sel. Areas Commun..
[65] Bruce Hajek,et al. Hiding traffic flow in communication networks , 1992, MILCOM 92 Conference Record.
[66] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[67] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[68] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[69] Richard E. Newman,et al. Transmission schedules to prevent traffic analysis , 1993, Proceedings of 9th Annual Computer Security Applications Conference.