A secure location service for ad hoc position-based routing using self-signed locations
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lim, J. | - |
dc.contributor.author | Kim, S. | - |
dc.contributor.author | Oh, H. | - |
dc.date.accessioned | 2022-10-07T12:11:12Z | - |
dc.date.available | 2022-10-07T12:11:12Z | - |
dc.date.created | 2022-09-16 | - |
dc.date.issued | 2007-12 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/111027 | - |
dc.description.abstract | Location service, which provides current geographic positions of nodes, is one of the key elements of position-based routing schemes for ad hoc networks. In this paper, we define security threats of location service and propose a new secure location service protocol that uses self-signed locations. In our proposed protocol, nodes register their public keys in other nodes during the initialization phase and these registered keys are used to verify the locations of other nodes and to generate their self-signed locations. In this paper, we show that our protocol is robust against traditional attacks and new attacks that may occur in position-based routings. We also analyze the efficiency of our protocol using various simulations. ? Springer-Verlag Berlin Heidelberg 2007. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Springer Verlag | - |
dc.title | A secure location service for ad hoc position-based routing using self-signed locations | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lim, J. | - |
dc.identifier.doi | 10.1007/978-3-540-76969-9_8 | - |
dc.identifier.scopusid | 2-s2.0-38349006282 | - |
dc.identifier.bibliographicCitation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.4856 LNCS, pp.121 - 132 | - |
dc.relation.isPartOf | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.title | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.volume | 4856 LNCS | - |
dc.citation.startPage | 121 | - |
dc.citation.endPage | 132 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Ad hoc networks | - |
dc.subject.keywordPlus | Computer simulation | - |
dc.subject.keywordPlus | Network routing | - |
dc.subject.keywordPlus | Public key cryptography | - |
dc.subject.keywordPlus | Tracking (position) | - |
dc.subject.keywordPlus | Position based routing | - |
dc.subject.keywordPlus | Secure location service | - |
dc.subject.keywordPlus | Security systems | - |
dc.subject.keywordAuthor | Ad hoc network | - |
dc.subject.keywordAuthor | Position-based routing | - |
dc.subject.keywordAuthor | Secure location service | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.