International Journal of Soft Computing

Year: 2014
Volume: 9
Issue: 3
Page No. 151 - 155

Certificateless Routing Method for Mobile Ad Hoc Networks

Authors : A. Rex Macedo Arokiaraj and A. Shanmugam

References

Bechler, M., H.J. Hof, D. Kraft, F. Pahlke and L. Wolf, 2004. A cluster-based security architecture for ad hoc networks. Proceedings of the 23rd IEEE Annual Joint Conference on Computer and Communications Societies, Volume 4, March 7-11, 2004, Hong Kong, China, pp: 2393-2403.

Hu, Y.C., D.B. Johnson and A. Perrig, 2003. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Int. J. Ad Hoc Networks, 1: 175-192.
Direct Link  |  

Khalili, A., J. Katz and W. Arbaugh, 2003. Toward secure key distribution in truly ad hoc networks. Proceedings of the International Conference on Applications over Ad-Hoc Networks, January 27-31, 2003, IEEE Xplore, pp: 342-346.

Kong, J., P. Zerfos, H. Luo, S. Lu and L. Zhang, 2001. Providing robust and ubiquitous security support for mobile Ad Hoc networks. Proceedings of the 9th International Conference on Network Protocols, November 11-14, 2001, Riverside, CA., USA., pp: 251-260.

Narasimha, M., G. Tsudik and J.H. Yi, 2003. On the utility of distributed cryptography in P2P and MANETs: The case of membership control. Proceedings of 11th International Conference on Network Protocols, November 4-7, 2003, IEEE Computer Society Washington, DC, USA., pp: 336-345.

Neuman, C. and T. Ts'o, 1994. Kerberos: An authentication service for computer networks. IEEE Commun. Maga., 32: 33-38.
Direct Link  |  

Papadimitratos, P. and Z.J. Haas, 2002. Secure routing for mobile ad hoc networks. Proceedings of the SCS Communication Networks and Distributed System Modeling and Simulation Conference, January 27-31, 2002, San Antonio, USA., pp: 193-204.

Sanzgiri, K., D. LaFlamme, B. Dahill, B. Levine, C. Shields and E.M. Belding-Royer, 2005. Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Commun., 23: 598-610.
CrossRef  |  

Saxena, N., G. Tsudik and J.H. Yi, 2004. Identity-based access control for ad hoc groups. Proceedings of the International Conference Information Security and Cryptology, December 2-3, 2004, Seoul, Korea, pp: 362-379.

Shamir, A., 1984. Identity based cryptosystems and signature schemes. Proceedings of the Information Conference on Advances in Cryptology, August 19-22, 1984, Santa Barbara, California, pp: 47-53.

Yi, S. and R. Kravets, 2003. Moca: Mobile certificate authority for wireless ad hoc networks. Proceedings of Second Annual PKI Research Workshop, April 28-29, 2003, Gaithersburg MD., USA -.

Zhou, L. and Z.J. Haas, 1999. Securing Ad Hoc networks. IEEE Network, 13: 24-30.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved