International Journal of Soft Computing
Year:
2014
Volume:
9
Issue:
3
Page No.
151 - 155
References
Bechler, M., H.J. Hof, D. Kraft, F. Pahlke and L. Wolf, 2004. A cluster-based security architecture for ad hoc networks. Proceedings of the 23rd IEEE Annual Joint Conference on Computer and Communications Societies, Volume 4, March 7-11, 2004, Hong Kong, China, pp: 2393-2403.
Hu, Y.C., D.B. Johnson and A. Perrig, 2003. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Int. J. Ad Hoc Networks, 1: 175-192.
Direct Link | Khalili, A., J. Katz and W. Arbaugh, 2003. Toward secure key distribution in truly ad hoc networks. Proceedings of the International Conference on Applications over Ad-Hoc Networks, January 27-31, 2003, IEEE Xplore, pp: 342-346.
Kong, J., P. Zerfos, H. Luo, S. Lu and L. Zhang, 2001. Providing robust and ubiquitous security support for mobile Ad Hoc networks. Proceedings of the 9th International Conference on Network Protocols, November 11-14, 2001, Riverside, CA., USA., pp: 251-260.
Narasimha, M., G. Tsudik and J.H. Yi, 2003. On the utility of distributed cryptography in P2P and MANETs: The case of membership control. Proceedings of 11th International Conference on Network Protocols, November 4-7, 2003, IEEE Computer Society Washington, DC, USA., pp: 336-345.
Neuman, C. and T. Ts'o, 1994. Kerberos: An authentication service for computer networks. IEEE Commun. Maga., 32: 33-38.
Direct Link | Papadimitratos, P. and Z.J. Haas, 2002. Secure routing for mobile ad hoc networks. Proceedings of the SCS Communication Networks and Distributed System Modeling and Simulation Conference, January 27-31, 2002, San Antonio, USA., pp: 193-204.
Sanzgiri, K., D. LaFlamme, B. Dahill, B. Levine, C. Shields and E.M. Belding-Royer, 2005. Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Commun., 23: 598-610.
CrossRef | Saxena, N., G. Tsudik and J.H. Yi, 2004. Identity-based access control for ad hoc groups. Proceedings of the International Conference Information Security and Cryptology, December 2-3, 2004, Seoul, Korea, pp: 362-379.
Shamir, A., 1984. Identity based cryptosystems and signature schemes. Proceedings of the Information Conference on Advances in Cryptology, August 19-22, 1984, Santa Barbara, California, pp: 47-53.
Yi, S. and R. Kravets, 2003. Moca: Mobile certificate authority for wireless ad hoc networks. Proceedings of Second Annual PKI Research Workshop, April 28-29, 2003, Gaithersburg MD., USA -.
Zhou, L. and Z.J. Haas, 1999. Securing Ad Hoc networks. IEEE Network, 13: 24-30.
CrossRef |