An Authentication Protocol-based Multi-Layer Clustering for Mobile Ad Hoc Networks |
Lee Keun-Ho
(고려대학교 컴퓨터학과)
Han Sang-Bum (고려대학교 컴퓨터학과) Suh Heyi-Sook (교육인적자원부 교육정보화기획과) Lee Sang-Keun (고려대학교 컴퓨터학과) Hwang Chong-Sun (고려대학교 컴퓨터학과) |
1 | S. Basagni, 'Distributed clustering for ad hoc networks,' in: Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms, and Networks, pages 310-315, Jun. 1999 |
2 | M. Bechler, H. -j. Hof, D. Kraft, F. Rahlke, L. Wolf, 'A Cluster-Based security architecture for ad hoc networks,' in: Proceedings of IEEE Conference on Computer Communications (INFOCOM) Hong Kong, March. 2004 |
3 | Elizabeth M. BEDING-ROYER, 'Multi-level hierarchies for scalable ad hoc routing,' Wireless Networks archive Volume9, Issue 5, pages 461-478, Sept. 2003 DOI ScienceOn |
4 | Y. Desmedt and Y. Frankel, 'Threshold cryptosystems,' Advances in Cryptology- Crypto '89 (Lecture Notes in Computer Science 435), G. Brassard, Ed, Springer-Verlag, page 307-15, Aug. 1990 |
5 | M. Jiang, J. Li, and Y.C. Tay, 'Cluster based routing protocol (CBRP),' functional specification, IETF Internet Draft, MANET working group, draft-ietf-manet-cbrp-spec-01.txt, Aug. 1999 |
6 | Lidong Zhou: Haas, Z.J.; 'Securing ad hoc networks,' IEEE Network, Volume: 13 Issue: 6, NOV.-Dec. pages 24-30, 1999 DOI ScienceOn |
7 | Seema Bandyopadhyay, Edward J. Coyle, 'Minimizing communication costs in hierarchically clustered networks of wireless sensors,' Elsevier, Computer Networks 44 (2004) 1-16 DOI ScienceOn |
8 | K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer, 'A secure routing protocol for ad hoc networks,' in: Proceedings IEEE Network Protocols, pages 78-87, 2002 |
9 | H.-S. Suh, S.-B. Han, K.-H. Lee, C.-S. Hwang, 'DSRR organization and its algorithm for efficient mobility management in the SIP,' IEICE TRANS. COMMUN., vol. E87-B, no. 7, pp. 1866-1873, July 2004 |
10 | M. Steiner, G. Tsudik, and M. Waidner, 'Diffie-Hellman Key Distribution Extended to Group Communication,' 3rd ACM Conference on Computer and Computer and Communications Security, 1998 DOI |