Ieee document 80311 01230 may 2001 21 w a arbaugh n

Info icon This preview shows pages 40–43. Sign up to view the full content.

View Full Document Right Arrow Icon
IEEE Document 803.11-01/230, May 2001. 21. W. A. Arbaugh, N. Shankar and Y. J. Wan. Your 802.11 wireless network has no clothes. In Proceedings of IEEE International Conference on Wireless LANs and Home Networks, December 2001. 22. N. Borisov, I. Goldberg and D. Wagner. Intercepting mobile communications: the insecurity of 802.11. In proceedings of ACM International Conference on Mobile Computing and Networking, July 2001. 23. R. Housley, W. Polk, W. Ford and D. Solo. Internet X.509 public key in- frastructure certificate and certificate revocation list (CRL) profile. Internet Request for Comments (RFC 3280), April 2002. 24. Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu. Cross-feature analysis for detecting ad-hoc routing anomalies. Proceedings. 23rd International Confer- ence on Distributed Computing Systems, Pages: 478 487, May 2003. 25. Claude Crepeau and Carlton R. Davis. A certificate revocation scheme for wireless ad hoc networks. Proceedings of first ACM Workshop Security of Wireless Ad hoc and Sensor Networks, 2003. Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 40

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
28 A. Naveed and S. Kanhere 26. T. Wu, Yuan Xue and Y. Cui. Preserving Traffic Privacy in Wireless Mesh Networks. Proceedings of WoWMoM’06, 2006. 27. Souheila Bouam and Jalel Ben Othman. Data security in ad hoc networks using multipath routing, Proccedings of 14th IEEE International Symposium on Personal. Indoor and Mobile Radio Communication, 2003. 28. S. Michell and K. Srinivasan. State based key hop protocol: A lightweight security protocol for wireless networks. Proceedings of PE-WASUN’04, October 2004. 29. Srdjan Capkun, Levente Buttyan and Jean-Pierre Hubaux. Self-organized public-key management for mobile Ad Hoc networks. IEEE transactions on mobile computing, vol 2, no 1, 2003. 30. R. Housley, Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP) , RFC 3686, January 2004. Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 41
Chapter 2 Key Distribution Mahalingam Ramkumar Department of Computer Science and Engineering Mississippi State University, MS 39762 [email protected] Securing any network calls for mechanisms to facilitate cryptographic se- curity associations between participants. The choice of key distribution schemes that facilitate such security associations mandates considera- tion of several factors, like the scope and types of security associations required, and the overhead that can be tolerated. The choice of schemes
Image of page 42

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 43
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern