A Unique Light Weight Time Stamp Based Distributed Security Protocol for Wireless Ad hoc Network
Abstract
Keywords
Full Text:
PDFReferences
Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, ―A Survey on Attacks and Counter measures in Mobile Ad Hoc Networks‖, Wireless/Mobile Network Security, Springer 2006.
Keerti Srivastava, Amit K Awasthi and R.C.Mittal, ―An Improved Timestamp-Based Password Remote User Authentication Scheme‖, Preprint submitted to Elsevier December 22, 2009.
Ajay Jangra, Nitin Goel, Priyanka & Komal Bhatia, ―Security Aspects in Mobile Ad Hoc Networks (MANETs): A Big Picture‖, International Journal of Electronics Engineering, pp. 189-196, 2010.
Guangyu Pei, Phillip A. Spagnolo and Fred L. Templin,‖ Enabling OSPFv3 MANET Extensions over IPv4 Encryptors‖, IEEE 2008.
Levente Butty´ana, L´aszl´o D´ora, Fabio Martinelli, Marinella Petrocchi, ―Fast Certificate-based Authentication Scheme in Multi-operator maintained Wireless Mesh Networks‖, Preprint submitted to Elsevier Computer Communications January 27, 2010.
Tao Ye, Darryl Veitch, Jean Bolot,‖ Improving Wireless Security Through Network Diversity‖, Computer Communication Review, vol. 39, pp. 34-44, 2009.
Cryptomathic Time Stamping Authority Technical White Paper, 2005.
Greg Rose, ―Combining Message Authentication and Encryption‖, Qualcomm Australia, 2003.
Kshitiz Saxena, ―The Analyses of Wireless Encryption Protocol- Proposed Enhancement to Handshake Mechanism in WPA‖, International Journal of Engineering Science and Technology, pp. 3657-3661,Vol. 2(8), 2010.
R. Murugan and A. Shanmugam, ―Key Distribution System for MANET with Minimum Prior Trust Relationship‖, International Journal of Recent Trends in Engineering, Vol. 1, No. 2, May 2009.
Jin-Man Kim, Jong-Wook Jang, "AODV based Energy Efficient Routing Protocol for Maximum Lifetime in MANET," aict-iciw, pp.77, Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT-ICIW'06), 2006.
SHU JIANG, ―Efficient Network Camouflaging In Wireless Networks‖, A dissertation Submitted to the Office of Graduate Studies of Texas A&M University, December 2005.
Rui-dan Su, Xiang-quan Che, Shao-feng Fu, Long-hai Li, Li-hua Zhou, "Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case," nswctc, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, vol. 2, pp.719-723, 2009.
Li Zhao, ―Enhance Communication Security In Wireless Ad Hoc Networks Through Multipath Routing‖, A dissertation submitted for the degree of DOCTOR OF PHILOSOPHY, WASHINGTON STATE UNIVERSITY, School of Electrical Engineering and Computer Science, AUGUST 2007.
Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon, ―Sign timing Scheme based on Aggregate Signatures‖, in ISI, pp. 145-149, IEEEE 2008.
Mohamed Salah Bouassida, Mohamed Bouali, ―On the Performance of Group Key Management Protocols in MANETs‖, Joint Conference on Security in Network Architectures and Information Systems (SAR-SSI‗07), Annecy (2007).
Harald H.-J. Bongartz, Tobias Ginzler, Thomas Bachran, Pere Tuset, ―SEAMAN: A Security-Enabled Anonymous MANET Protocol‖, RTO-MP-IST-083, RTO Information Systems Technology Panel (IST) Symposium, No. 20, pp. 1-14, 2008.
Qian Fang, Ying Liu and Xiaoqun Zhao, ―A Chaos–Based Secure Cluster Protocol For Wireless Sensor Networks‖, pp. 522-533, Vol. 44, No. 4, Kybernetika, 2008.
R.PushpaLakshmi, Dr.A.Vincent Antony Kumar, ―Cluster Based Composite Key Management in Mobile Ad Hoc Networks‖, International Journal of Computer Applications (0975 – 8887) Volume 4 – No.7, July 2010.
C. Perkins and E. Royer,‖ Ad hoc on-demand distance vector routing‖, IEEE WMCSA‘99 (1999).
Sunam Ryu, Kevin Butler, Patrick Traynor, Patrick McDaniel, "Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems," ainaw, vol. 1, pp.519-524, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007.
Anni Matinlauri, ―Fairness and Transmission Opportunity Limit in IEEE 802.11e Enhanced Distributed Channel Access‖, Master‘s Thesis, HELSINKI UNIVERSITY OF TECHNOLOGY Faculty of Electronics, Communications and Automation Networking Laboratory‖, Espoo, 2008.
Jungwook Song, Sunyoung Han, ―Mobile Node Authentication Protocolfor Proxy Mobile‖, International Journal of Computer Science and Applications, pp. 10 – 19, Vol. 6, No. 3, 2009.
Monis Akhlaq, M Noman Jafri, Muzammil A Khan, and Baber Aslam, ―Addressing Security Concerns of Data Exchange in AODV Protocol‖, World Academy of Science, Engineering and Technology, 2006.
Haodong Wang Æ Qun Li, ―Achieving robust message authentication in sensor networks: a public-key based approach‖, Wireless Netw, DOI 10.1007/s11276-009-0184-z, Springer May 2009.
Anil Kapil, Sanjeev Rana, ―Identity-Based Key Management in MANETs using Public Key Cryptography‖, International Journal of Security (IJS), pp 1-8, Vol. 3, Issue 1, 2009.
S. Balfe, K. Boklan, Z. Klagsburn, and K.G. Paterson, ―Key Refreshing in Identity-based Cryptography and its Applications in MANETs‖, In Proceedings of the2007 IEEE Military Communications Conference(Milcom 2007), 2007.
―Wireless Network Security‖, white paper, proxim wireless networks, 2003.
Nishu Garg, R.P.Mahapatra, ―MANET Security Issues‖, IJCSNS International Journal of Computer Science and Network Security, pp.241-246, VOL.9 No.8, August 2009.
S. Nesargi and R. Prakash, ―MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network‖, pp 1-10, INFOCOM, 2002.
Panagiotis Papadimitratos and Zygmunt J. Haas, ―Secure Routing for Mobile Ad hoc Networks‖, In Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), pp 1-13, January, 2002.
Manel Guerrero Zapata, ―Secure Ad hoc On-Demand Distance Vector Routing‖, Mobile Computing and Communications Review, pp. 106-107, Vol.6, No.3, 2001.
Manel Guerrero Zapata, ―Securing and Enhancing Routing Protocols for Mobile Ad hoc Networks‖,, Thesis for the degree of Doctor of Philosophy Doctorate in Computer Architecture and Technology Computer Architecture Department (DAC), Technical University of Catalonia Universitat Polit`ecnica de Catalunya, Barcelona, March 2006.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.