Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2007-19
Add to Favorite Get Latest Update

Survey of Privacy and Authentication Schemes for Ad Hoc Networks

HU Rong-lei,LIU Jian-wei,ZHANG Qi-shan(School of Electronics and Information Engineering,Beijing University of Aeronautics and Astronautics,Beijing 100083)  
The article surveys the state of the privacy and authentication schemes for Ad Hoc networks,analyzes the important problems in establishing and implementing privacy and authentication schemes according to characteristic of Ad Hoc networks,introduces all schemes in existence and makes a contrastive analysis of their merits and faults,proposes some scenarios to solve problems that still exist in these schemes and presents the challenges that are still worth to further research in the area.
【CateGory Index】: TN929.5;TN918.82
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 CAO Bing-hua,ZHANG Hong-qi,DU Xue-hui,QIAN Yan-bin(Institute of Electronic Technology,PLA Information Engineering University,Zhengzhou 450004,China);Hybrid authentication mechanism for Ad Hoc networks[J];Computer Engineering and Design;2009-15
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 YING Bi-di,CHEN Hui-fang,ZHAO Wen-dao,QIU Pei-liangDept.of Information Science and Electronic Engineering Zhejiang Univ.Hangzhou 310027,China;Low-Power Key Pre-Distribution Scheme in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
2 JIANG Yi,SHI Hao-shan(School of Electronics and Information,Northwestern Polytechnical University,Xi'an 710072,China);Merkle Tree Based Broadcast Authentication Strategies in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
3 FANG Qian,ZHAO Xiao-qun*(College of electronic and information engineering,Tongji university,shanghai 200092,China);A Secure Geographic Integrated Protocol for Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-05
4 WU Di,HU Gang,NI Gang,LI Wei,ZHANG Zhuo(College of Computer and Information Engineering,Hohai University,Changzhou Jiangsu 213022,China);Research on Secure Routing Protocols in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-07
5 PANG Liao-jun1,2,LI Hui-xian3,JIAO Li-cheng2,WANG Yu-min11.The Ministry of Edu.Key Lab.of Computer Networks and Information Security,Xidian University,Xi'an 710071,China;2.Institute of Intelligent Information Processing,Xidian University,Xi'an 710071,China;3.School of Comput.Sci.,Northwestern Polytechnical Univ,Xi'an 710072,China;Broadcast Key Distribution Protocol of Wireless Sensor Networks Based on Secret Sharing[J];Chinese Journal of Sensors and Actuators;2008-10
6 PAN Julong1,2,LI Shanping1,WU Zhendong3,ZHANG Daoyuan21.College of Computer Science,Zhejiang University,Hangzhou 310027,China;2.Department of Computer,China Jiliang University,Hangzhou 310018,China;3.College of Comm.Eng.,Hangzhou Dianzi University,Hangzhou 310018,China;A Design of Secure Community Healthcare Monitoring System Based on Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2009-06
7 YANG Guang-song1,CHEN Chao-yang1,XIAO Ming-bo2(1.School of Information Engineering,Jimei University,Xiamen 361021,China;2.Department of Communication Engineering,Xiamen University,Xiamen 361005,China);Design of cross-layer security for wireless sensor network's[J];Transducer and Microsystem Technologies;2007-02
8 ZHOU Quan1,ZHOU Xiao-dong2(1.Institute of Information Security,Guangzhou University,Guangzhou 510006,China;2.West Sichuan Drilling Corp,Chengdu 610011,China);Trusted routing protocol based on cluster head for wireless sensor networks[J];Transducer and Microsystem Technologies;2008-10
9 YANG Li-juan,HUANG Dao-chang,LI Yuan-ping(College of Computer and Communication Engineering,Changsha University of Science and Technology,Changsha 410076,China);Research on key management in Wireless Sensor Network[J];Journal of Changsha Communications University;2008-01
10 WANG Gang1,WEN Tao1,2,GUO Quan2,MA Xue-bin1(1.Software Center,Northeastern University,Shenyang 110004,China;2.Department of Computer Science and Technology,Neusoft Information Institute,Dalian 116023,China.);A Cluster-Based Security Protocol in Wireless Sensor Networks[J];Journal of Northeastern University(Natural Science);2009-01
China Proceedings of conference Full-text Database 6 Hits
1 CHEN Shuai a,ZHONG Xianxin b,LIAO Xiaowei a,SHI Junfeng b aElectronic staff room in physics department,Huainan Normal University,Huainan,Anhui,China,232001;bKey Lab for Optoelectronic Technology&System of China Ministry of Education,Chongqing University,Chongqing 400030;Prolong Minimum Period of Integer Chaos Child Key for Wireless Sensor Network Security[A];[C];2007
2 Fang Qian ZhaoXiaoqun (College of Electronic& Information Engineering,Tongji University,Shanghai,200092,China);A Secure Geographic Stateless Routing for Wireless Sensor Networks[A];[C];2008
3 ZHANG Jizan School of Mathematics and Message,Ludong University,Yantai 264025;A Key Distribution Scheme Based on Layers in Clustered Wireless Sensor Network[A];[C];2008
4 Zhang Zhijiang~(1,2) Tang Hong~1 Zhu Liehuang~1 Wang Zhiyuan~3 ~1 Beijing Laboratory of Intelligent Information Technology,School of Computer Science,Beijing Institute of Technology,Beijing 100081; ~2 The Electronic Technology Institute of Air Force,Beijing 100089; ~3 PLA Information Engineering College Information Technology Institute,Zhenzhou 450002;A Certificate-Based Security and Authentication Scheme for Wireless Sensor Networks[A];[C];2008
5 Wang Jianqiu1,2 Lang Weimin3 Ji Yinghua1 (1 College of Physics and Communication Electronics, Jiangxi Normal University, Nanchang, 330027, China; 2 College of Electronic and Information Engineering,Wuhan Institute of Technology, Wuhan, 430074, China; 3 PLA Communication Commands Academy, Wuhan, 430010, China);Research on the Security in Wireless Sensor Network[A];[C];2008
6 Zhao Zhibin,Dong Xiaomei,Yao Lan,Yu Ge Faculty of Information Science and Engineering,Northeastern University,Shenyang 110004,China;Research on Biological Immunity Principle Based Security Model for Wireless Sensor Network[A];[C];2009
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 NING Hong-zhou,LIU Yun,HE De-quan (School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044,China);A Distributed Algorithm of Certificate Revocation for Ad Hoc Network[J];Journal of Northern Jiaotong University;2005-02
2 LIN Jun1,2, WANG Yan1,3(1.The Telecommunication Institute of University of Tianjin,Tianjin 300072,China;2.The Industrial Special Secondary School of the Job of Handan of Hebei,Handan 056002,China;3.Shandong Zibo City Zichuan District Technical School,Zibo 255100,China);Installation on the Basis of Windows Environment NS2 Network Simulation Software[J];Computer Knowledge and Technology;2006-08
3 Wu Yue,Cao Xiuying,Hu Aiqun,Bi Guangguo(Dept. of Radio Engineering,Southeast University,Nanjing 210096);Research on Security Technology of Wireless Local Area Network[J];Telecommunications Science;2002-06
4 SHU Yan tai,GAO De yun,WANG Lei (Dept.of Computer Science and Engineering,Tianjin University,Tianjin 300072,China);Multipath Source Routing in Wireless Ad Hoc Networks[J];Acta Electronica Sinica;2002-02
5 Zhang Jizhong,Yang Hao,Zhou Xi(Chongqing Communication Institute,Chongqing 400035,China);Analysis of mobile Ad Hoc network routing protocols[J];Study on Optical Communications;2007-06
6 ZHANG Chang-an(School of Information Management & Engineering,Shanghai University of Finance & Economics,Shanghai 200434,China);Summary of routing protocols and classifications of wireless mobile Ad Hoc networks[J];Journal of Guizhou Education Institute;2007-04
7 LIU Chang-xin,PENG Song-song,WU Lan-ying(Department of Computer Science,Jinggangshan University,Ji'an 343009,China);Network simulation implement based on NS2[J];Journal of Jinggangshan University;2007-06
8 WU Yu (Hunan Lodi Broadcast TV University,loudi Hunan 417000, China);The Analysis and Application of Network Simulation Technology[J];Journal of Hunan University of Science and Engineering;2007-04
9 ZHU Xiping1,2,LU Rongbo1,WANG Xian2(1.Mathematics and Computer Science Department of Jishou University,Jishou,416000,Hunan China;2.Computer and Communication College of South West Jiao Tong University, Chengdu 610031,Sichuan China);Simulation Study of Mobile Wireless Ad Hoc Network Based on NS2[J];Journal of Jishou University(Natural Science Edition);2003-02
10 LIU Bo-lan,SONG Ling College of Computer & Electronic Information,Guangxi University,Nanning 530004,China;Simulation and implementation of routing protocol in MANET based on NS2[J];Computer Engineering and Applications;2007-06
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved