Browse > Article

무선 메쉬 네트워크의 보안  

Kim, Jong-Taek (서울대학교)
Park, Se-Ung (서울대학교)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 I. F. Akyildiz, X. Wang, and W. Wang, 'Wireless mesh networks: a survey,' Computer Networks, 47(4):445-487, 2005   DOI   ScienceOn
2 A. Haq, A. Naveed, and S. S. Kanhere, 'Securing Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks,' UNSW-CSE-TR-0622, 2006
3 Y.-Ch. Hu and A.Perrig, 'A Survey of Secure Wireless Ad Hoc Routing,' IEEE Security and Privacy, special issue on Making Wireless Work, vol 2, no. 3, 2004
4 A. Shamir, 'How to share a secret,' Communications of the ACM, 22(11):612-613, Nov. 1979   DOI   ScienceOn
5 Y. Desmedt and S. Jajodia, 'Redistributing secret shares to new access structures and its applications,' Technical Report ISSE TR-97-01, George Mason University, 1997
6 P. Feldman, 'A practical scheme for non-interactive verifiable secret sharing,' Proceedings of the 28th IEEE Annual Symposium on Foundations of Computer Science, pp. 427-437, Oct. 1987
7 S. Yi and R. Kravets, 'MOCA: mobile certificate authority for wireless ad hoc networks,' The 2nd Annual PKI Research Workshop (PKI' 03)
8 L. Zhou and Z. Haas, 'Securing ad hoc networks,' IEEE Network Magazine, 13(6):24-30, 1999
9 P. M. Ruiz and A. F. Gomez-Skarmeta, 'Heuristic algorithms for minimum bandwidth consumption multicast routing in wireless mesh networks,' Proceedings of ADHOC-NOW, pp. 258-270, 2005
10 S. Capkun, L. Buttyan, and J.-P. Hubaux, 'Self-organized public-key management for mobile ad hoc networks,'. IEEE Transactions on Mobile Computing, 2(1), 2003
11 W. Xu, W. Trappe, Y. Zhang, and T. Wood, 'The Feasibility of Launching and Detecting Jamming Attacks in Wireless. Networks,' Proceedings of MobiHoc, 2005
12 S. Yi and R. Kravets, 'Composite Key Management for Ad Hoc Networks,' Proceedings of MobiQuitous, 2004
13 T. M. Wong, C. Wang, and J. M. Wing, 'Verifiable secret redistribution for archive systems,' Proceedings of the First International IEEE Security in Storage Workshop (SISW 2002), Greenbelt, MD, Nov. 2002
14 Y. Zhang and Y. Fang, 'ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks,' IEEE Journal on Selected Areas in Communications, vol. 24, no. 10, 2006
15 B. Wu, J. Wu, E. Fernandez, and S. Magliveras, 'Secure and efficient key management in mobile ad hoc wireless networks,' Proceedings of the 19th IEEE international parallel and distributed symposium (IPDPS 2005). The first international workshop on security in systems and networks (SSN 2005), p.288, 2005
16 A. Seshadri, A. Perrig, L. van Doom, and P. Khosla, 'SWATT: SoftWare-based Attestation for Embedded Devices', Proceedings of IEEE Symposim on Security and Privacy, 2004
17 N. Ben Salem and J.-P. Hubaux, 'Securing Wireless Mesh Networks,' IEEE Wireless Communications, 13(2):50-55, Apr. 2006