Report on a working session on security in wireless ad hoc networks

Association for Computing Machinery (ACM) - Tập 7 Số 1 - Trang 74-94 - 2003
Levente Buttyán1, Jean-Pierre Hubaux1
1Swiss Federal Institute of Technology -- Lausanne (EPFL), Switzerland

Tóm tắt

Từ khóa


Tài liệu tham khảo

10.1109/INFCOM.1999.749266

M. Blaze , J. Feigenbaum , J. Ioannidis , and A. Keromytis . The KeyNote trust-management system Version 2. Internet RFC 2704, September 1999 .]] M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The KeyNote trust-management system Version 2. Internet RFC 2704, September 1999.]]

E. Bonabeau , M. Dorigo , and G. Theraulaz . Swarm Intelligence: From Natural to Artificial Systems. SFI Studies in the Sciences of Complexity . Oxford University Press , July 1999 .]] E. Bonabeau, M. Dorigo, and G. Theraulaz. Swarm Intelligence: From Natural to Artificial Systems. SFI Studies in the Sciences of Complexity. Oxford University Press, July 1999.]]

10.1145/513800.513828

10.5555/647064.714757

L. Buttyáin and J.-P. Hubaux . Stimulating cooperation in self-organizing mobile ad hoc networks . ACM/Kluwer Mobile Networks and Applications (MONET) , to appear 2002.]] L. Buttyáin and J.-P. Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications (MONET), to appear 2002.]]

10.5555/794201.795174

10.1145/581291.581313

C. Castelluccia and G. Montenegro . Securing group management in IPv6. Technical report , INRIA , August 2002 .]] C. Castelluccia and G. Montenegro. Securing group management in IPv6. Technical report, INRIA, August 2002.]]

10.1145/570645.570647

C. Ellison and al. SPKI certificate theory. Internet RFC 2693, September 1999 .]] C. Ellison and al. SPKI certificate theory. Internet RFC 2693, September 1999.]]

D. B. Johnson . Routing in ad hoc networks of mobile hosts . In Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) , pages 158 -- 163 , December 1994 .]] D. B. Johnson. Routing in ad hoc networks of mobile hosts. In Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pages 158--163, December 1994.]]

10.5555/832315.837553

J. Kong , P. Zerfos , H. Luo , S. Lu , and L. Zhang . Providing robust and ubiquitous security support for MANET . In Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP) , 2001 .]] J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for MANET. In Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP), 2001.]]

P. Kyasanur and N. H. Vaidya . Detection and handling of MAC layer misbehavior in wireless networks. Technical report, CSL , UIUC , August 2002 .]] P. Kyasanur and N. H. Vaidya. Detection and handling of MAC layer misbehavior in wireless networks. Technical report, CSL, UIUC, August 2002.]]

10.17487/RFC2018

10.1109/SP.1980.10006

G. Montenegro and C. Castelluccia . Statistically Unique and Cryptographically Verifiable (SUCV) identifiers and addresses . In Proceedings of the 9th Annual Network and Distributed System Security Symposium (NDSS) , February 2002 .]] G. Montenegro and C. Castelluccia. Statistically Unique and Cryptographically Verifiable (SUCV) identifiers and addresses. In Proceedings of the 9th Annual Network and Distributed System Security Symposium (NDSS), February 2002.]]

T. Narten , E. Nordmark , and W. A. Simpson . Neighbor discovery for IP version 6 (IPv6). Internet RFC 2461, December 1998 .]] T. Narten, E. Nordmark, and W. A. Simpson. Neighbor discovery for IP version 6 (IPv6). Internet RFC 2461, December 1998.]]

P. Papadimitratos and Z. J. Haas . Secure routing for mobile ad hoc networks . In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation (CNDS) , January 2002 .]] P. Papadimitratos and Z. J. Haas. Secure routing for mobile ad hoc networks. In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation (CNDS), January 2002.]]

C. Perkins , E. Belding-Royer , and S. Das . Ad hoc on demand distance vector (AODV) routing for IP version 6. Internet Draft, draft-perkinsmanet-aodv6-01.txt , November 2001 .]] C. Perkins, E. Belding-Royer, and S. Das. Ad hoc on demand distance vector (AODV) routing for IP version 6. Internet Draft, draft-perkinsmanet-aodv6-01.txt, November 2001.]]

C. Perkins , E. Belding-Royer , and S. Das . Ad hoc on demand distance vector (AODV) routing , June 2002 .]] C. Perkins, E. Belding-Royer, and S. Das. Ad hoc on demand distance vector (AODV) routing, June 2002.]]

10.1145/190314.190336

10.5555/520551.837511

10.5555/882494.884425

10.1145/501436.501437

Y.-C. Hu , D. B. Johnson , and A. Perrig . Secure efficient distance vector routing in mobile wireless ad hoc networks . In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) , June 2002 .]] Y.-C. Hu, D. B. Johnson, and A. Perrig. Secure efficient distance vector routing in mobile wireless ad hoc networks. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), June 2002.]]

10.1145/570645.570648

10.5555/645532.656326

B. Schneier . Secrets and Lies: Digital Security in a Networked World . Wiley Computer Publishing , 2000 .]] B. Schneier. Secrets and Lies: Digital Security in a Networked World. Wiley Computer Publishing, 2000.]]

Trimble Navigation Limited . Data sheet and specifications for Trimble Thunderbolt GPS Disciplined Clock . Sunnyvale, California . Available at http://www.trimble.com/thunderbolt.html.]] Trimble Navigation Limited. Data sheet and specifications for Trimble Thunderbolt GPS Disciplined Clock. Sunnyvale, California. Available at http://www.trimble.com/thunderbolt.html.]]

10.1145/844102.844108

10.1145/345910.345958

Y. Zhang , W. Lee , and Y. Huang . Intrusion detection techniques for mobile wireless networks . ACM/Kluwer Mobile Networks and Applications (MONET) , to appear 2002.]] Y. Zhang, W. Lee, and Y. Huang. Intrusion detection techniques for mobile wireless networks. ACM/Kluwer Mobile Networks and Applications (MONET), to appear 2002.]]

10.1109/65.806983

10.1145/571637.571638