Security Topics and Mobility Management in Hierarchical Ad Hoc Networks (Samoyed): Final Report
暂无分享,去创建一个
Pekka Orponen | Maarit Hietalahti | Mikko Särelä | Antti J. Tuominen | Antti Tuominen | P. Orponen | Mikko Särelä | M. Hietalahti
[1] G. Sicuranza,et al. The landmark hierarchy: A new hierarchy for routing in very large networks , 1988 .
[2] Uta Wille,et al. Communication complexity of group key distribution , 1998, CCS '98.
[3] Pekka Nikander,et al. BLIND: A Complete Identity Protection Framework for End-Points , 2004, Security Protocols Workshop.
[4] Gene Tsudik,et al. Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.
[5] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[6] Charles E. Perkins,et al. Ad Hoc Networking , 2001 .
[7] P. Nikander,et al. Applying host identity protocol to tactical networks , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..
[8] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[9] Martha Steenstrup,et al. Cluster-based networks , 2001 .
[10] Qun Li,et al. Online power-aware routing in wireless Ad-hoc networks , 2001, MobiCom '01.
[11] Anthony Ephremides,et al. A Distributed Algorithm for Organizing Mobile Radio Telecommunication Networks , 1981, IEEE International Conference on Distributed Computing Systems.
[12] W. Hamilton,et al. The Evolution of Cooperation , 1984 .
[13] Jean-Jacques Quisquater,et al. Generic insecurity of cliques-type authenticated group key agreement protocols , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[14] Christos Gkantsidis,et al. On the Semantics of Internet topologies , 2002 .
[15] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[16] Markus Jakobsson,et al. A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks , 2003, Financial Cryptography.
[17] Ram Ramanathan,et al. Hierarchically‐organized, multihop mobile wireless networks for quality‐of‐service support , 1998, Mob. Networks Appl..
[18] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[19] Wilson Vicente Ruggiero,et al. A Trust-Based Security Architecture for Small and Medium-Sized Mobile Ad Hoc Networks , 2004 .
[20] A. Ephremides,et al. A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.
[21] Ram Ramanathan,et al. Making link-state routing scale for ad hoc networks , 2001, MobiHoc '01.
[22] Ivan Marsic,et al. Clustering overhead for hierarchical routing in mobile ad hoc networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[23] Hongqiang Zhai,et al. Reliable and efficient packet forwarding by utilizing path diversity in wireless ad hoc networks , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..
[24] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[25] Panagiotis Papadimitratos,et al. Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.
[26] RamanathanRam,et al. Hierarchically-organized, multihop mobile wireless networks for quality-of-service support , 1998 .
[27] Scott Shenker,et al. Geographic routing without location information , 2003, MobiCom '03.
[28] Dhiraj K. Pradhan,et al. A cluster-based approach for routing in dynamic networks , 1997, CCRV.
[29] John S. Baras,et al. Modeling key agreement in multi-hop ad hoc networks , 2006, IWCMC '06.
[30] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[31] Eitan Altman,et al. Non-cooperative Forwarding in Ad-Hoc Networks , 2005, NETWORKING.
[32] W. Hamilton,et al. The evolution of cooperation. , 1984, Science.
[33] Pekka Nikander,et al. Delegation of Signalling Rights , 2002, Security Protocols Workshop.
[34] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[35] Zygmunt J. Haas,et al. A new routing protocol for the reconfigurable wireless networks , 1997, Proceedings of ICUPC 97 - 6th International Conference on Universal Personal Communications.
[36] Stefan Schlott,et al. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.
[37] Xiaoyan Hong,et al. LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[38] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[39] Xiaoyan Hong,et al. Scalable routing protocols for mobile ad hoc networks , 2002, IEEE Netw..
[40] Jennifer Bray,et al. Bluetooth: Connect Without Cables , 2000 .
[41] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[42] Satu Elisa Schaeffer,et al. Stochastic Local Clustering for Massive Graphs , 2005, PAKDD.
[43] Samir Khuller,et al. A clustering scheme for hierarchical control in multi-hop wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[44] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[45] Gregory S. Lauer,et al. Hierarchical Routing Design for Suran , 1986, International Conference on Intelligent Cloud Computing.
[46] Ryuji Wakikawa,et al. Global connectivity for IPv6 Mobile Ad Hoc Networks , 2006 .
[47] Farouk Kamoun,et al. Stochastic Performance Evaluation of Hierarchical Routing for Large Networks , 1979, Comput. Networks.
[48] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[49] Shouhuai Xu,et al. LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[50] Xiang-Yang Li,et al. Regional gossip routing for wireless ad hoc networks , 2003, 28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings..
[51] Atsushi Iwata,et al. Scalable routing strategies for ad hoc wireless networks , 1999, IEEE J. Sel. Areas Commun..
[52] Robert H. Deng,et al. Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient , 2003, ACNS.
[53] Prithwish Basu,et al. A mobility based metric for clustering in mobile ad hoc networks , 2001, Proceedings 21st International Conference on Distributed Computing Systems Workshops.
[54] Zygmunt J. Haas,et al. The Interzone Routing Protocol (IERP) for Ad Hoc Networks , 2002 .
[55] Ricardo Staciarini Puttini,et al. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.
[56] Bharat K. Bhargava,et al. On security study of two distance vector routing protocols for mobile ad hoc networks , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[57] Teemu Koponen,et al. Resilient Connections for SSH and TLS , 2006, USENIX Annual Technical Conference, General Track.
[58] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[59] Yu-Chee Tseng,et al. A Two-Tier Heterogeneous Mobile Ad Hoc Network Architecture and Its Load-Balance Routing Problem , 2004, Mob. Networks Appl..
[60] Mario Gerla,et al. Fisheye state routing: a routing scheme for ad hoc wireless networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.
[61] Zhang Ya-juan,et al. An identity-based key-exchange protocol , 2008, Wuhan University Journal of Natural Sciences.
[62] Frank Harary,et al. Graph Theory , 2016 .
[63] Levente Buttyán,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.
[64] Tomoyuki Ohta,et al. An adaptive multihop clustering scheme for highly mobile ad hoc networks , 2003, The Sixth International Symposium on Autonomous Decentralized Systems, 2003. ISADS 2003..
[65] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[66] Azer Bestavros,et al. Small-World Internet Topologies: Possible Causes and Implications on Scalability of End-System Multicast , 2002 .
[67] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[68] Vikram Srinivasan,et al. Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[69] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[70] Maarit Hietalahti. A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks , 2008, Electron. Notes Theor. Comput. Sci..
[71] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[72] Tzu-Jane Tsai,et al. A access-based clustering protocol for multihop wireless ad hoc networks , 2001, IEEE J. Sel. Areas Commun..
[73] Mario Gerla,et al. Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..
[74] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[75] Maarit Hietalahti. Key Establishment in Ad-hoc Networks , 2001 .
[76] Charles E. Perkins,et al. IP Mobility Support , 1996, RFC.
[77] Evangelos Kranakis,et al. S-RIP: A Secure Distance Vector Routing Protocol , 2004, ACNS.
[78] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[79] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[80] C. Siva Ram Murthy,et al. MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks , 2006, Comput. Networks.
[81] Kwangjo Kim,et al. An Efficient Tree-Based Group Key Agreement Using Bilinear Map , 2003, ACNS.
[82] Jean-Pierre Hubaux,et al. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .
[83] Satu Elisa Schaeffer,et al. Dynamic Local Clustering for Hierarchical Ad Hoc Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[84] Gene Tsudik,et al. A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks , 2005, J. Inf. Sci. Eng..
[85] Maarit Hietalahti. Efficient Key Agreement for Ad-hoc Networks , 2001 .
[86] Pietro Lungaro. Cost/Performance Trade-offs of "Two-Layers" Ad Hoc Multihop Cellular Access Systems , 2004 .
[87] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..
[88] BlazevicL.,et al. Self organization in mobile ad hoc networks , 2001 .
[89] Xiaoyan Hong,et al. LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility , 1988, MobiHoc.
[90] Farouk Kamoun,et al. Hierarchical Routing for Large Networks; Performance Evaluation and Optimization , 1977, Comput. Networks.
[91] Pekka Nikander,et al. Local clustering for hierarchical ad hoc networks , 2004 .
[92] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[93] Mario Gerla,et al. Multicluster, mobile, multimedia radio network , 1995, Wirel. Networks.
[94] Timothy J. Shepard. Some Thoughts on HIP Rendezvous , 2004 .
[95] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[96] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[97] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[98] Yanghee Choi,et al. K-hop cluster-based dynamic source routing in wireless ad-hoc packet radio network , 1998, VTC '98. 48th IEEE Vehicular Technology Conference. Pathway to Global Wireless Revolution (Cat. No.98CH36151).
[99] Ricardo Staciarini Puttini,et al. Combining Certification-based Authentication and Intrusion Detection to Secure Manet Routing Protocols , 2004 .
[100] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[101] Dirk Westhoff,et al. Estimating the value of co-operation approaches for multi-hop ad hoc networks , 2005, Ad Hoc Networks.
[102] Patrick Horster,et al. Self-certified keys — Concepts and Applications , 1997 .
[103] Anthony Ephremides,et al. The Architectural Organization of a Mobile Radio Network via a Distributed Algorithm , 1981, IEEE Trans. Commun..
[104] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[105] Xiang-Yang Li,et al. Efficient hybrid key agreement protocol for wireless ad hoc networks , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.
[106] Xiaoyan Hong,et al. Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[107] Yih-Chun Hu,et al. Wormhole Detection in Wireless Ad Hoc Networks , 2002 .
[108] C C. Chiang,et al. Routing in Clustered Multihop, Mobile Wireless Networks With Fading Channel , 1997 .
[109] Jalel Ben-Othman,et al. Data security in ad hoc networks using multipath routing , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[110] Haiyun Luo,et al. URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.
[111] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[112] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[113] Xiaoyan Hong,et al. A wireless hierarchical routing protocol with group mobility , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).
[114] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[115] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[116] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[117] Carl M. Ellison,et al. SPKI Requirements , 1999, RFC.
[118] G Németh,et al. Giant clusters in random ad hoc networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[119] Jon Kleinberg,et al. The Structure of the Web , 2001, Science.
[120] Felix C. Gaertner,et al. A Survey of Self-Stabilizing Spanning-Tree Construction Algorithms , 2003 .
[121] Charles E. Perkins,et al. Mobility support in IPv6 , 1996, MobiCom '96.
[122] Gabriel Montenegro,et al. Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.
[123] Srdjan Capkun,et al. Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.
[124] Srdjan Capkun,et al. Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..
[125] Silvia Giordano,et al. Modelling cooperation in mobile ad hoc networks: a formal description of selfishness , 2003 .
[126] Stefano Basagni,et al. Distributed clustering for ad hoc networks , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).
[127] George Kesidis,et al. Secure routing in ad hoc networks and a related intrusion detection problem , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..