微波EDA网,见证研发工程师的成长!
首页 > 通信和网络 > 通信网络技术文库 > 无线异构网络的关键安全技术

无线异构网络的关键安全技术

时间:06-01 来源:中国联通网站 点击:

g and Computing in MOBIHOC’ 01), Oct 4-5, 2001, Long Beach, CA, USA. New York, NY, USA: ACM, 2001:146-155.

  [15] Zapata m g, Asokan n. Securing ad hoc routing protocols[C]// Proceedings of ACM Workshop on Wireless Security (WiSe’02), Sep 28, 2002, Atlanta, GA, USA. New York, NY, USA: ACM, 2002:1-10.

  [16] Binkley j, Trost w. Authenticated ad hoc routing at link layer for mobile systems[J]. Wireless Networks, 2001, 7(2):139-145.

  [17] Marti s, Giuli t, Lai k, at al. Mitigating routing misbehavior in mobile wireless networks[C]// Proceedings of 6th Annual International Conference on Mobile Computing and Networking (MOBICOM’00), Aug 6-11,2000,Boston,MA,USA.New York,NY,USA:ACM,2000: 255-265.

  [18] Buchegger s, Le Boudec j v. Performance analysis of the confident protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks) [C]// Proceedings of 6th Annual International Conference on Mobile Computing and Networking (MOBICOM'00), Aug 6-11, 2000, Boston, MA, USA. New York, NY, USA: ACM, 2000: 226-236.

  [19] Wang Weichao, YI Lu, Bhargava b k. On vulnerability and protection of ad hoc on-demand distance vector prototol[C]// Proceedings of International Conference on Telecommunication (ICT’03): Vol 1, Feb23-Mar 1, 2003, Paris, France. Piscataway, NJ, USA: IEEE, 2003:375-382.

  [20] Ala-Laurila j, Mikkonen j, Rinnemaa j. Wireless LAN access network architecture for mobile operators[J]. IEEE Communications Magazine, 2001, 39(11): 82-89.

  [21] Luo h, Jiang z, Kim b j, et al. Integrating wireless LAN and cellular data for the enterprise[J]. IEEE Internet Computing, 2003, 7(2):25-33.

  [22] 3GPP TS 23.234 V6.1.0. 3GPP System to WLAN Interworking; System Description[S].

  [23] 3GPP TS 33.234 V1.0.1. 3G Security: Wireless Local Area Network (WLAN) Interworking Security[S].

  [24] Bhargava b, Wu Xiaoxin , LU Yi, et al.Integrating heterogeneous wireless technologies: A cellular aided mobile ad hoc network (CAMA) [J]. Mobile Networks and Applications,2004, 9(4):393-408.

  [25] Luo H, Ramjee R, Sinha P, et al. UCAN: a unified cellular and ad hoc network architecture[C]// /Proceedings of 9th Annual International Conference on Mobile Computing and Networking(MOBICOM'03),Sep 14-19,2003, San Diego, CA, USA. New York, NY, USA: ACM, 2003:353-367.

  [26] Carbunar b, loannidis l, Nita-Rotaru c. JANUS: Towards robust and malicious resilient routing in hybrid wireless networks[C]// Proceedings of the ACM Workshop on Wireless Security (WiSe'04), Oct 1, 2004, Philadelphia, PA, USA . New York, NY, USA: ACM, 2004: 11-20.

  [27] Durresi A,Evans L,Paruchuri V, et al. Secure 3G user authentication in ad hoc serving networks[C]// Proceedings of the 1st International Conference on Availability, Reliability and Security (ARES'06), Apr 20-22,2006,Vienna, Austria. Los Alamitos, CA, USA: IEEE Computer Society, 2006: 488- 495.

  [28] Aboudagga n, Refaei m t, Eltoweissy m, et al. Authentication protocols for ad hoc networks: Taxonomy and research issues [C]// Proceedings of the 1st ACM international workshop on Quality of Service & security in wireless and mobile networks(Q2SWinet'05), Oct 13, 2005, Quebec, Canada. New York, NY, USA: ACM, 2005:96-104.

  [29] Kachirski o, Guha r. Intrusion detection using mobile agents in wireless ad hoc networks [C]//Proceedings of IEEE Worhshop on Knowledge Media Networking (KMN'02), Jul 10-12, 2002, Kyoto,Japan. Piscataway, NJ, USA: IEEE, 2002: 153-158.

  [30] Zhang Y, Lee W, Huang Y A. Intrusion detection techniques for mobile wireless networks[J].Wireless Networks,2003, 9 (5):545-556.

[31] Gevaryahu r, Yaros b. Misuse Detection and Preventio

Copyright © 2017-2020 微波EDA网 版权所有

网站地图

Top