%%%%%%%%%% % raffo-phdthesis.bib % LaTeX bibliography file for the PhD thesis % "Security Schemes for the OLSR Protocol for Ad Hoc Networks" % by Daniele Raffo 15 SEP 2005 Universite Paris 6 % % Keywords: ad hoc network, routing, security, cryptography %%%%%%%%%% %%%%%%%%%% AD HOC ROUTING PROTOCOLS %%%%%%%%%% @inproceedings{zrp, author = "Zygmunt J. Haas", title = "A new routing protocol for the reconfigurable wireless networks", booktitle = "Proceedings of the 6th IEEE International Conference on Universal Personal Communications (ICUPC '97)", month = "October", year = "1997", address = "San Diego, CA, USA", volume = "2", pages = "562--566" } % IERP for ZRP @misc{ierp, author = "Zygmunt J. Haas and Marc R. Pearlman and Prince Samar", title = "The {I}nterzone {R}outing {P}rotocol ({IERP}) for Ad Hoc Networks", note = "Internet-Draft, \texttt{draft-ietf-manet-zone-ierp-02.txt}, work in progress", month = "July", year = "2002" } % IARP for ZRP @misc{iarp, author = "Zygmunt J. Haas and Marc R. Pearlman and Prince Samar", title = "The {I}ntrazone {R}outing {P}rotocol ({IARP}) for Ad Hoc Networks", note = "Internet-Draft, \texttt{draft-ietf-manet-zone-iarp-02.txt}, work in progress", month = "July", year = "2002" } @misc{cbrp, author = "Mingliang Jiang and Jinyang Li and Y. C. Tay", title = "{C}luster {B}ased {R}outing {P}rotocol ({CBRP})", note = "Internet-Draft, \texttt{draft-ietf-manet-cbrp-spec-01.txt}, work in progress", month = "August 14", year = "1999" } @misc{dsr, author = "David B. Johnson and David A. Maltz and Yih-Chun Hu", title = "The {D}ynamic {S}ource {R}outing Protocol for Mobile Ad Hoc Networks ({DSR})", note = "Internet-Draft, \texttt{draft-ietf-manet-dsr-10.txt}, work in progress", month = "July 19", year = "2004" } @misc{ospf, author = "J. Moy", title = "{OSPF} Version 2", month = "April", year = "1998", note = "RFC 2328, Standards Track" } @misc{ospfipv6, author = "R. Coltun and D. Ferguson and J. Moy", title = "{OSPF} for {IP}v6", month = "December", year = "1999", note = "RFC 2740, Standards Track", } @misc{fsr, author = "Mario Gerla and Xiaoyan Hong and Guangyu Pei", title = "{F}isheye {S}tate {R}outing Protocol ({FSR}) for Ad Hoc Networks", note = "Internet-Draft, \texttt{draft-ietf-manet-fsr-03.txt}, work in progress", month = "June 17", year = "2002" } @inproceedings{fisheye, author = "Guangyu Pei and Mario Gerla and Tsu-Wei Chen", title = "Fisheye {S}tate {R}outing: A routing scheme for ad hoc wireless networks", booktitle = "Proceedings of the IEEE International Conference on Communications (ICC 2000)", pages = "70--74", month = "June", year = "2000", address = "New Orleans, LA, USA" } @misc{lanmar, author = "Mario Gerla and Xiaoyan Hong and Li Ma and Guangyu Pei", title = "Landmark Routing Protocol {(LANMAR}) for Large Scale Ad Hoc Networks", note = "Internet-Draft, \texttt{draft-ietf-manet-lanmar-05.txt}, work in progress", month = "November 17", year = "2002" } @inproceedings{landmark, author = "Mario Gerla and Xiaoyan Hong and Guangyu Pei", title = "Landmark Routing for Large Ad Hoc Wireless Networks", booktitle = "Proceedings of the IEEE Global Communications Conference (GLOBECOM 2000)", address = "San Francisco, CA, USA", month = "November", year ="2000" } @incollection{dynsrout, author = "David B. Johnson and David A. Maltz", title = "{D}ynamic {S}ource {R}outing in Ad Hoc Wireless Networks", booktitle = "Mobile Computing", volume = "353", pages = "153--181", publisher = "Kluwer Academic Publishers", editor = "Imielinski and Korth", year = "1996", url = "citeseer.ist.psu.edu/johnson96dynamic.html" } @misc{star, author = "J.J. Garcia-Luna-Aceves and Marcelo Spohn and David Beyer", title = "{S}OURCE {T}REE {A}DAPTIVE {R}OUTING ({STAR}) PROTOCOL", note = "Internet-Draft, \texttt{draft-ietf-manet-star-00.txt}, work in progress", month = "October 22", year = "1999" } @inproceedings{dsdv, author = "Charles E. Perkins and Pravin Bhagwat", title = "Highly dynamic {D}estination-{S}equenced {D}istance-{V}ector routing ({DSDV}) for mobile computers", booktitle = "Proceedings of the SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications", year = "1994", isbn = "0897916824", pages = "234--244", address = "London, United Kingdom", doi = "http://doi.acm.org/10.1145/190314.190336", publisher = "ACM Press" } % WRP @article{wrp, author = "Shree Murthy and J. J. Garcia-Luna-Aceves", title = "An Efficient Routing Protocol for Wireless Networks", journal = "Mobile Networks and Applications", volume = "1", number = "2", pages = "183--197", year = "1996", url = "citeseer.ist.psu.edu/murthy96efficient.html" } % WIRP @inproceedings{wings, author = "J. J. Garcia-Luna-Aceves and Chane L. Fullmer and Ewerton Madruga and David Beyer and Thane Frivold", title = "Wireless {I}nternet gateways ({WING}S)", booktitle = "Proceedings of the IEEE Military Communications Conference (MILCOM '97)", month = "November", year = "1997", address = "Monterey, CA, USA", pages = "1271--1276" } @inproceedings{adv, author = "Rajendra V. Boppana and Satyadeva P. Konduru", title = "An {A}daptive {D}istance {V}ector Routing Algorithm for Mobile, Ad Hoc Networks", booktitle = "Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2001)", pages = "1753--1762", year = "2001", url = "citeseer.ist.psu.edu/article/boppana01adaptive.html" } @misc{aodv, author = "C. Perkins and E. Belding-Royer and S. Das", title = "{A}d hoc {O}n-Demand {D}istance {V}ector ({AODV}) Routing", month = "July", year = "2003", note = "RFC 3561, Experimental" } @inproceedings{aodvr, author = "Charles E. Perkins and Elizabeth M. Royer", title = "Ad-hoc On-Demand Distance Vector Routing", booktitle = "Proceedings of the 2nd IEEE Workshop on Mobile Computer Systems and Applications", month = "February 25--26", year = "1999", address = "New Orleans, LA, USA" } @misc{tbrpf, author = "R. Ogier and F. Templin and M. Lewis", title = "{T}opology Dissemination {B}ased on {R}everse-{P}ath {F}orwarding ({TBRPF})", key = "RFC 3684", month = "February", year = "2004", note = "RFC 3684, Experimental" } @misc{olsr, author = "Thomas {Clausen (ed)} and Philippe Jacquet (ed)", title = "{O}ptimized {L}ink {S}tate {R}outing protocol ({OLSR})", month = "October", year = "2003", note = "RFC 3626, Experimental", } @misc{olsrv2, author = "Thomas Clausen", title = "The {O}ptimized {L}ink-{S}tate {R}outing {P}rotocol version 2", note = "Internet-Draft, \texttt{draft-clausen-manet-olsrv2-00.txt}, work in progress", month = "July 11", year = "2005" } @inproceedings{olsreval, author = "Thomas Heide Clausen and Gitte Hansen and Lars Christensen and Gerd Behrmann", title = "The {O}ptimized {L}ink {S}tate {R}outing Protocol, Evaluation through Experiments and Simulation", booktitle = "Proceedings of the IEEE Symposium on Wireless Personal Mobile Communications", month = "September", year = "2001" } @inproceedings{olsrforadhoc, author = "Philippe Jacquet and Paul Mühlethaler and Thomas Clausen and Anis Laouiti and Amir Qayyum and Laurent Viennot", title = "{O}ptimized {L}ink {S}tate {R}outing Protocol for Ad Hoc Networks", booktitle = "Proceedings of the IEEE International Multitopic Conference (INMIC 2001)", address = "Pakistan", year = "2001" } @misc{molsr, author = "Philippe Jacquet and Pascale Minet and Anis Laouiti and Laurent Viennot and Thomas Clausen and Cédric Adjih", title = "{M}ulticast {O}ptimized {L}ink {S}tate {R}outing", note = "Internet-Draft, \texttt{draft-ietf-manet-olsr-molsr-01.txt}, work in progress", month = "November", year = "2001" } % MOLSR @phdthesis{unimulticast, author = "Anis Laouiti", title = "Unicast et Multicast dans les réseaux ad hoc sans fil", school = "Université de Versailles Saint-Quentin-en-Yvelines", year = 2002 } %%%%%%%%%% WIRELESS NETWORKING %%%%%%%%%% @phdthesis{channelaccess, author = "Amir Qayyum", title = "Analysis and Evaluation of Channel Access schemes and Routing Protocols in Wireless {LAN}s", school = "Université Paris-Sud Orsay", year = 2000 } @inproceedings{partialtopo, author = "Thomas Clausen and Philippe Jacquet and Laurent Viennot", title = "Investigating the Impact of Partial Topology in Proactive {MANET} Routing Protocols", booktitle = "Proceedings of the Fifth International Symposium on Wireless Personal Multimedia Communications (WPMC 2002)", address = "Waikiki, Honolulu, Hawaii, USA", month = "October 27--30", year = "2002" } @techreport{mpr, author = "Amir Qayyum and Laurent Viennot and Anis Laouiti", title = "Multipoint relaying: An efficient technique for flooding in mobile wireless networks", institution = "HIPERCOM Project, INRIA Rocquencourt", year = "2000", number = "INRIA RR-3898" } @unpublished{interferencesolsr, author = "Dang Quan Nguyen and Pascale Minet", title = "Effet des interférences sur {OLSR}: quelques résultats de simulation", note = "HIPERCOM Project, INRIA Rocquencourt", month = "August", year = 2003 } @techreport{hiperlan1, title = "{B}roadband {R}adio {A}ccess {N}etworks ({BRAN}); {HI}gh {PE}rformance {R}adio {L}ocal {A}rea {N}etwork ({HIPERLAN}) Type 1; Functional specification", institution = "ETSI", year = "1998", number = "EN 300 652 ref. REN/BRAN-10-01", key = "etsihiperlan1" } @techreport{hiperlan2a, title = "{B}roadband {R}adio {A}ccess {N}etworks ({BRAN}); {HIPERLAN} Type 2; System Overview", institution = "ETSI", year = "1997", number = "TR 101 683 ref. DTR/BRAN-0023002", key = "etsihiperlan2a" } @techreport{hiperlan2b, title = "{B}roadband {R}adio {A}ccess {N}etworks ({BRAN}); {HI}gh {PE}rformance {R}adio {L}ocal {A}rea {N}etwork ({HIPERLAN}) Type 2; Requirements and architectures for wireless broadband access", institution = "ETSI", year = "1998", number = "TR 101 031 ref. RTR/BRAN-0022001", key = "etsihiperlan2b" } @techreport{80211a, title = "Part 11: Wireless {LAN} {M}edium {A}ccess {C}ontrol ({MAC}) and {P}hysical {L}ayer ({PHY}) specifications: High-speed Physical Layer in the 5 {GH}z Band", institution = "IEEE", year = "2003", number = "IEEE Std 802-11a-1999(R2003)", note = "ISO/IEC 8802-11:1999/Amd 1:2000(E)", key = "ieee80211a" } @techreport{80211b, title = "Part 11: Wireless {LAN} {M}edium {A}ccess {C}ontrol ({MAC}) and {P}hysical {L}ayer ({PHY}) specifications: Higher-speed Physical Layer Extension in the 2.4 {GH}z Band", institution = "IEEE", year = "2003", number = "IEEE Std 802.11b-1999 (R2003)", key = "ieee80211b" } @techreport{80211g, title = "Part 11: Wireless {LAN} {M}edium {A}ccess {C}ontrol ({MAC}) and {P}hysical {L}ayer ({PHY}) specifications: Amendment 4: Further Higher Data Rate Extension in the 2.4 {GH}z Band", institution = "IEEE", year = "2003", number = "IEEE Std 802.11g-2003", key = "ieee80211g" } @techreport{80216, title = "Part 16: Air Interface for Fixed Broadband Wireless Access Systems", institution = "IEEE", year = "2002", number = "IEEE Std 802.16-2001", key = "ieee80216" } @book{wifiprat, author = "Davor Males and Guy Pujolle", title = "Wi-Fi par la pratique", year = 2002, isbn = "2212111207", publisher = "Groupe Eyrolles" } @book{buildingwireless, author = "Rob Flickenger", title = "Building Wireless Community Networks", year = 2003, isbn = "0596005024", publisher = "O'Reilly \& Associates Inc." } @book{80211reseaux, title = "802.11 et les réseaux sans fil", author = "Paul Mühlethaler", year = 2002, isbn = "2212111541", publisher = "Groupe Eyrolles" } @book{lesreseaux, title = "Les Réseaux", author = "Guy Pujolle", year = 2002, isbn = "2212110863", publisher = "Groupe Eyrolles" } @book{tcpip, title = "Internetworking with TCP/IP", author = "Douglas E. Comer", year = 1995, isbn = "0132169878", publisher = "Prentice-Hall Inc." } @book{networks, title = "Computer Networks", author = "Andrew Tanenbaum", year = 2002, isbn = "0130661023", publisher = "Prentice Hall" } %%%%%%%%%% MANET SECURITY %%%%%%%%%% @misc{solsrps, author = "Thomas {Clausen (ed)} and Emmanuel Baccelli (ed)", title = "Securing {OLSR} Problem Statement", note = "Internet-Draft, \texttt{draft-clausen-manet-solsr-ps-00.txt}, work in progress", month = "February 14", year = "2005" } @inproceedings{advsig, author = "Daniele Raffo and Cédric Adjih and Thomas Clausen and Paul Mühlethaler", title = "An Advanced Signature System for {OLSR}", booktitle = "Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN~'04)", month = "October 25", year = "2004", pages = "10--16", doi = "http://doi.acm.org/10.1145/1029102.1029106", publisher = "ACM Press", address = "Washington, DC, USA" } @inproceedings{gpsolsr, author = "Daniele Raffo and Cédric Adjih and Thomas Clausen and Paul Mühlethaler", title = "{OLSR} with {GPS} information", booktitle = "Proceedings of the 2004 Internet Conference (IC 2004)", month = "October 28--29", year = "2004", address = "Tsukuba, Japan" } @inproceedings{olsrnodeloc, author = "Daniele Raffo and Cédric Adjih and Thomas Clausen and Paul Mühlethaler", title = "Securing {OLSR} Using Node Locations", booktitle = "Proceedings of 2005 European Wireless (EW 2005)", pages = "437--443", isbn = "3800728869", month = "April 10--13", year = "2005", address = "Nicosia, Cyprus" } @inproceedings{securingolsr, author = "Cédric Adjih and Thomas Clausen and Philippe Jacquet and Anis Laouiti and Paul Mühlethaler and Daniele Raffo", title = "Securing the {OLSR} Protocol", booktitle = "Proceedings of the 2nd IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2003)", month = "June 25--27", year = "2003", address = "Mahdia, Tunisia" } @techreport{sigdbexchospf, author = "Thomas Clausen and Philippe Jacquet and Emmanuel Baccelli", title = "Signature and database exchange for wireless {OSPF} interfaces", month = "January", year = 2004, institution = "HIPERCOM Project, INRIA Rocquencourt", number = "INRIA RR-5096" } @inproceedings{secextolsr, title = "Secure Extension to the {OLSR} protocol", author = "Andreas Hafslund and Andreas T{\o}nnesen and Roar Bj{\o}rgum Rotvik and Jon Andersson and {\O}ivind Kure", booktitle = "2004 OLSR Interop and Workshop", month = "August 6--7", year = "2004", address = "San Diego, CA, USA" } @inproceedings{secureolsr, title = "Secure {OLSR}", author = "Fan Hong and Liang Hong and Cai Fu", booktitle = "Proceedings of the 19th IEEE International Conference on Advanced Information Networking and Applications (AINA '05)", month = "March 28--30", year = "2005", address = "Tamkang University, Taiwan" } @inproceedings{olsrdkm, title = "Attacks against {OLSR}: Distributed Key Management for Security", author = "Cédric Adjih and Daniele Raffo and Paul Mühlethaler", booktitle = "2005 OLSR Interop and Workshop", month = "July 28--29", year = "2005", address = "Ecole Polytechnique, Palaiseau, France" } @inproceedings{secroutolsr, title = "Secure routing functions for {OLSR} protocol", author = "Shuichi Isida and Eriko Ando and Yasuko Fukuzawa", booktitle = "2005 OLSR Interop and Workshop", month = "July 28--29", year = "2005", address = "Ecole Polytechnique, Palaiseau, France" } @inproceedings{cadolsr, title = "Implementing a fully distributed {C}ertificate {A}utorithy in an {OLSR MANET}", author = "D. Dhillon and T. S. Randhawa and M. Wang and L. Lamont", booktitle = "Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2004)", month = "March 21--25", year = "2004", address = "Atlanta, Georgia, USA" } @techreport{secolsrc, author = "Cédric Adjih and Thomas Clausen and Anis Laouiti and Paul Mühlethaler and Daniele Raffo", title = "Securing the {OLSR} Routing Protocol With or Without Compromised Nodes in the Network", institution = "HIPERCOM Project, INRIA Rocquencourt", month = "February", year = "2005", number = "INRIA RR-5494" } @misc{rfc2154, author = "S. Murphy and M. Badger and B. Wellington", title = "{OSPF} with Digital Signatures", key = "RFC 2154", month = "June", year = 1997, note = "RFC 2154, Experimental" } @misc{saodv, author = "Manel Guerrero Zapata", title = "{S}ecure {A}d hoc {O}n-Demand {D}istance {V}ector ({SAODV}) Routing", note = "Internet-Draft, \texttt{draft-guerrero-manet-saodv-03.txt}, work in progress", month = "March 17", year = "2005" } % threshold cryptography for MANETs @article{securingadhoc, author = "Lidong Zhou and Zygmunt J. Haas", title = "Securing Ad Hoc Networks", journal = "{IEEE} Network", volume = "13", number = "6", pages = "24--30", year = "1999", url = "citeseer.nj.nec.com/zhou99securing.html" } @inproceedings{selfsecuring, author = "Haiyun Luo and Petros Zerfos and Jiejun Kong and Songwu Lu and Lixia Zhang", title = "Self-securing Ad Hoc Wireless Networks", booktitle = "Proceedings of the 7th IEEE Symposium on Computers and Communications (ISCC '02) ", year = "2002", url = "citeseer.nj.nec.com/luo02selfsecuring.html" } @inproceedings{sar, title = "{S}ecurity-Aware Ad-Hoc Routing for Wireless Networks", author = "Seung Yi and Prasad Naldurg and Robin Kravets", booktitle = "Proceedings of the {ACM} Symposium on Mobile Ad Hoc Networking and Computing ({MobiHoc} 2001)", address = "Long Beach, CA, USA", year = 2001, month = "October", url = "citeseer.nj.nec.com/yi01securityaware.html" } @article{watchdogpathrater, author = "Sergio Marti and T. J. Giuli and Kevin Lai and Mary Baker", title = "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", journal = "Mobile Computing and Networking", pages = "255-265", year = "2000", url = "citeseer.nj.nec.com/marti00mitigating.html" } @inproceedings{questsecurity, author = "Jean-Pierre Hubaux and Levente Butty\'an and Sr\dj an \v{C}apkun", title = "The Quest for Security in Mobile Ad Hoc Networks", booktitle = "Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001)", year = 2001, url = "citeseer.nj.nec.com/493788.html" } @inproceedings{packetpurse, author = "Levente Butty\'an and Jean-Pierre Hubaux", title = "Enforcing Service Availability in Mobile Ad-Hoc {WAN}s", booktitle = "Proceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc 2000)", address = "Boston, MA, USA", year = "2000", month = "August" } @inproceedings{selforgpk, author = "Sr{\dj}an \v{C}apkun and Levente Butty\'an and Jean-Pierre Hubaux", title = "Self-Organized Public-Key Management for Mobile Ad Hoc Networks", booktitle = "Proceedings of the ACM International Workshop on Wireless Security (WiSe)", year = 2002 } @inproceedings{duckling, author = "Frank Stajano and Ross Anderson", title = "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks", booktitle = "Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science", year = "1999" } @misc{keyestabadhoc, author = "Maarit Hietalahti", title = "Key Establishment in Ad-hoc Networks", howpublished = "Tik-110.501 Seminar on Network Security" } @inproceedings{confidant, author = "Sonja Buchegger and Jean-Yves Le Boudec", title = "Performance Analysis of the {CONFIDANT} Protocol ({C}ooperation {O}f {N}odes: {F}airness {I}n {D}ynamic {A}d-hoc {N}e{T}works)", booktitle = "Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002)", month = "June 9--11", year = 2002, address = "EPFL Lausanne, Switzerland" } @inproceedings{srp, author = "Panagiotis Papadimitratos and Zygmunt J. Haas", title = "Secure Routing for Mobile Ad Hoc Networks", booktitle = "Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002)", address = "San Antonio, TX, USA", month = "January 27--31", year = "2002" } @inproceedings{slsp, author = "Panagiotis Papadimitratos and Zygmunt J. Haas", title = "Secure Link State Routing for Mobile Ad Hoc Networks", booktitle = "Proceedings of the 2003 International Symposium on Applications and the Internet (SAINT '03)", address = "Orlando, FL, USA", month = "January 28", year = "2003" } @inproceedings{ariadne, author = "Yih-Chun Hu and Adrian Perrig and David B. Johnson", title = "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks", booktitle = "Proceedings of the 8th Annual ACM International Conference on Mobile Computing and Networking (MobiCom '02)", month = "September", year = "2002", url = "citeseer.nj.nec.com/hu02ariadne.html" } @article{byzantine, author = "Leslie Lamport and Robert Shostak and Marshall Pease", title = "The {B}yzantine Generals Problem", journal = "ACM Transactions on Programming Languages and Systems", volume = "4", number = "3", pages = "382--401", year = "1982" } @inproceedings{coopintrdetect, author = "Steven Cheung and Karl N. Levitt", title = "Protecting Routing Infrastructures from {D}enial of {S}ervice Using Cooperative Intrusion Detection", booktitle = "New Security Paradigms Workshop", year = "1997", url = "citeseer.nj.nec.com/cheung97protecting.html" } @inproceedings{watchers, author = "Kirk A. Bradley and Steven Cheung and Nick Puketza and Biswanath Mukherjee and Ronald A. Olsson", title = "Detecting Disruptive Routers: A Distributed Network Monitoring Approach", booktitle = "Proceedings of the {IEEE} Symposium on Research in Security and Privacy (S \& P 1998)", pages = "115--124", year = "1998", month = "May" } % criticisms about WATCHERS @inproceedings{conservationflow, author = "John R. Hughes and Tuomas Aura and Matt Bishop", title = "Using Conservation of Flow as a Security Mechanism in Network Protocols", booktitle = "Proceedings of the {IEEE} Symposium on Research in Security and Privacy (S \& P 2000)", pages = "131--132", month = "May 14--17", year = "2000", url = "citeseer.nj.nec.com/hughes00using.html" } % MAE @inproceedings{mae, author = "Ricardo Staciarini Puttini and Ludovic Me and Rafael Tim\'oteo de Sousa", title = "Certification and authentication services for securing {MANET} routing protocols", booktitle = "Proceedings of the 5th IFIP TC6 International Conference on Mobile and Wireless Communications Networks", month = "October", year = "2003", address = "Singapore" } @inproceedings{ubiqsec, title = "Providing robust and ubiquitous security support for mobile ad-hoc networks", author = "Jiejun Kong and Petros Zerfos and Haiyun Luo and Songwu Lu and Lixia Zhang", booktitle = "9th IEEE International Conference on Network Protocols (ICNP 2001)", pages = "251--260", year = 2001 } @inproceedings{wormhole, title = "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks", author = "Yih-Chun Hu and Adrian Perrig and David B. Johnson", booktitle = "Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003)", address = "San Francisco, CA, USA", month = "April", year = "2003" } @inproceedings{sead, title = "{SEAD}: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks", author = "Yih-Chun Hu and David B. Johnson and Adrian Perrig", booktitle = "Proceedings of the 4th IEEE Workshop on Mobile Computing Systems \& Applications (WMCSA 2002)", pages = "3--13", address = "Calicoon, NY, USA", month = "June", year = "2002" } @inproceedings{rushing, title = "Rushing attacks and defense in wireless ad hoc network routing protocols", author = "Yih-Chun Hu and Adrian Perrig and David B. Johnson", booktitle = "Proceedings of the 2003 ACM Workshop on Wireless Security", year = "2003", isbn = "1581137699", pages = "30--40", address = "San Diego, CA, USA", doi = "http://doi.acm.org/10.1145/941311.941317", publisher = "ACM Press" } @inproceedings{tesla, title = "Efficient authentication and signature of multicast streams over lossy channels", author = "Adrian Perrig and Ran Canetti and Doug Tygar and Dawn Song", booktitle = "Proceedings of the IEEE Symposium on Research in Security and Privacy (S \& P 2000)", pages = "56--73", month = "May 14--17", year = "2000" } @inproceedings{tesla2, title = "Efficient and Secure Source Authentication for Multicast", author = "Adrian Perrig and Ran Canetti and Dawn Song and J. D. Tygar", booktitle = "Proceedings of the Network and Distributed System Security Symposium (NDSS '01)", pages = "35--46", month = "February", year = "2001" } @inproceedings{efficientmsgauth, author = "S. Cheung", title = "An Efficient Message Authentication Scheme for Link State Routing", booktitle = "13th Annual Computer Security Applications Conference", pages = "90-98", year = "1997", url = "citeseer.ist.psu.edu/cheung97efficient.html" } @article{spreadspectrum, author = "Raymond L. Pickholtz and Donald L. Schilling and Laurence B. Milstein", title = "Theory of Spread Spectrum Communications -- A Tutorial", journal = "IEEE Transactions on Communications", volume = "30", number = "5", pages = "855--884", month = "May", year = "1982" } @inproceedings{aran, author = "Kimaya Sanzgiri and Bridget Dahill and Brian Neil Levine and Clay Shields and Elizabeth M. Belding-Royer", title = "A Secure Routing Protocol for Ad Hoc Networks", booktitle = "Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP '02)", year = "2002", isbn = "0769518567", pages = "78--89", publisher = "IEEE Computer Society" } @article{stimucoop, author = "Levente Butty\'an and Jean-Pierre Hubaux", title = "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks", journal = "ACM/Kluwer Mobile Networks and Applications", volume = "8", number = "5", year = "2003", month = "October" } % uses multiple confirmations of RREP/RREQ to secure the DSR protocol @inproceedings{robustrouting, author = "Seungjoon Lee and Bohyung Han and Minho Shin", title = "Robust Routing in Wireless Ad Hoc Networks", booktitle = "2002 International Conference on Parallel Processing Workshops (ICPPW '02)", month = "August 18--21", year = "2002", address = "Vancouver, Canada" } % MOCA: a subgroup of physically secure nodes to which the CA functionalities are distributed @techreport{moca, author = "Seung Yi and Robin Kravets", title = "Practical {PKI} for Ad Hoc Wireless Networks", month = "August", year = "2001", institution = "University of Illinois at Urbana-Champaign, USA", number = "UIUCDCS-R-2002-2273 UILU-ENG-2002-1717" } % illustrates a wormhole-like attack against SRP, proposes Bloodhound as a modification of Watchdog @inproceedings{analysissrp, author = "John Marshall", title = "An analysis of {SRP} for mobile ad hoc networks", booktitle = "Proceedings of the 2002 International Multiconference in Computer Science", month = "August 18--21", year = "2002", address = "Las Vegas, USA" } % Privacy-Preserving Routing @techreport{ppr, title = "Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks", author = "Sr{\dj}an \v{C}apkun and Jean-Pierre Hubaux and Markus Jacobsson", institution = "Swiss Federal Institute of Technology Lausanne (EPFL), Lausanne, Switzerland and RSA Laboratories, Bedford, MA, USA", year = "2004", number = "IC/2004/10" } @inproceedings{jellyfishdos, title = "{D}enial of {S}ervice Resilience in Ad Hoc Networks", author = "Imad Aad and Jean-Pierre Hubaux and Edward W. Knightly", booktitle = "Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom '04)", month = "September 26--October 1", year = "2004", address = "Philadelphia, Pennsylvania, USA" } @inproceedings{shrew, author = "Aleksandar Kuzmanovic and Edward W. Knightly", title = "Low-rate {TCP}-targeted {D}enial of {S}ervice attacks ({T}he Shrew vs. the Mice and Elephants)", booktitle = "Proceedings of the 2003 Conference of the Special Interest Group on Data Communication (SIGCOMM '03)", year = "2003", isbn = "1581137354", pages = "75--86", address = "Karlsruhe, Germany", publisher = "ACM Press" } @phdthesis{hopack, title = "Network layer protocols with Byzantine robustness", author = "Radia Perlman", school = "Massachussets Institute of Technology", year = "1988" } @phdthesis{secschemesolsr, title = "Security Schemes for the {OLSR} Protocol for Ad Hoc Networks", author = "Daniele Raffo", school = "Université Paris 6 and INRIA Rocquencourt", year = "2005" } @phdthesis{secmodeladhoc, title = "A security model for mobile ad hoc networks", author = "Ricardo Staciarini Puttini", school = "University of Brasilia", year = "2004" } @article{hiddenstation, author = "Fouad A. Tobagi and Leonard Kleinrock", title = "Packet Switching in Radio Channels: Part {II} -- The Hidden Terminal Problem in {C}arrier {S}ense {M}ultiple-{A}ccess and the Busy-Tone Solution", journal = "{IEEE} Transactions on Communications", pages = "1417--1433", volume = "23", number = "12", year = "1975", month = "December" } @inproceedings{trustroutcoop, author = "Eli Winjum and P{\aa}l Spilling and {\O}ivind Kure", title = "Trust Metric Routing to Regulate Routing Cooperation in Mobile Wireless Ad Hoc Networks", booktitle = "Proceedings of 2005 European Wireless (EW 2005)", pages = "399--406", month = "April 10--13", year = "2005", address = "Nicosia, Cyprus" } @inproceedings{olsrperfo, author = "Eli Winjum and Anne Marie Hegland and P{\aa}l Spilling and {\O}ivind Kure", title = "A performance evaluation of security schemes proposed for the {OLSR} protocol", booktitle = "Proceedings of the IEEE Military Communications Conference (MILCOM 2005) \emph{(to appear)}", month = "October 17--21", year = "2005", address = "Atlantic City, NJ, USA" } @inproceedings{trustrout, author = "Eli Winjum and {\O}ivind Kure and P{\aa}l Spilling", title = "Trust Metric Routing in Mobile Wireless Ad Hoc Networks", booktitle = "Proceedings of World Wireless Congress 2004", month = "May 25--28", year = "2004", address = "San Francisco, CA, USA" } @inproceedings{talkstr, author = "Dirk Balfanz and D. K. Smetters and Paul Stewart and H. Chi Wong", title = "Talking To Strangers: Authentication in Ad-Hoc Wireless Networks", booktitle = "Proceedings of Network and Distributed System Security Symposium 2002 ({NDSS '02})", year = "2002", address = "San Diego, CA, USA", month = "February" } @inproceedings{gkg, author = "Alec Yasinsac and Vikram Thakur and Stephen Carter and Ilkay Cubukcu", title = "A Family of Protocols for Group Key Generation in Ad Hoc Networks", booktitle = "Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN '02)", pages = "183--187", month = "November 4--6", year = "2002" } %%%%%%%%%% SYNCHRONIZATION AND TIMESTAMPS %%%%%%%%%% @article{tclocksorder, title = "Time, Clocks, and the Ordering of Events in a Distributed System", author = "Leslie Lamport", journal = "Communications of the ACM", volume = "21", number ="7", year = "1978", month = "July", pages = "558--565" } @inproceedings{msgfresh, author = "Li Gong", title = "Variations on the themes of message freshness and replay -- or the difficulty of devising formal methods to analyze cryptographic protocols", booktitle = "Proceedings of the Computer Security Foundations Workshop VI", pages = "131--136", year = "1993", publisher = "IEEE Computer Society Press", url = "citeseer.nj.nec.com/gong93variations.html" } @article{dynclocksynchro, author = "Danny Dolev and Joseph Y. Halpern and Barbara Simons and Ray Strong", title = "Dynamic Fault-Tolerant Clock Synchronization", journal = "Journal of the ACM", volume = "42", number = "1", pages = "143--185", year = "1995", url = "citeseer.nj.nec.com/dolev95dynamic.html" } @article{dependingsynchro, author = "Li Gong", title = "A security risk depending on synchronized clocks", journal = "ACM Operating System Review", volume = "26", number = "1", pages = "49--53", year = "1992" } @inproceedings{clocksynchrofaults, author = "Boaz Barak and Shai Halevi and Amir Herzberg and Dalit Naor", title = "Clock Synchronization with Faults and Recoveries (extended abstract)", booktitle = "Symposium on Principles of Distributed Computing", pages = "133-142", year = 2000, url = "citeseer.nj.nec.com/barak00clock.html" } @misc{kerbclocksadrift, author = "Don Davis and Daniel E. Geer", title = "Kerberos Security with Clocks Adrift: History, Protocols, and Implementation", month = "September", year = 1995 } @inproceedings{kerberos, title = "Kerberos: An Authentication Service for Open Network Systems", author = "Jennifer G. Steiner and Clifford Neuman and Jeffrey I. Schiller", booktitle = "Proceedings of the Usenix Winter Conference", address = "Berkeley, CA, USA", year = "1988", month = "February", pages = "191--202" } @article{tkeydistr, title = "Timestamps in Key Distribution Protocols", author = "Dorothy E. Denning and Giovanni Maria Sacco", journal = "Communications of the ACM", volume = "24", number ="8", year = 1981, month = "August", pages = "533--536" } @techreport{quartzfreq, author = "John R. Vig", title = "Introduction to Quartz Frequency Standards", number = "SLCET-TR-92-1", institution = "Army Research Laboratory, Electronics and Power Sources Directorate", address = "Fort Monmouth, NJ, USA", year = "1992", month = "October" } %%%%%%%%%% COMPUTER AND NETWORK SECURITY %%%%%%%%%% @book{maxsecurity, title = "Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network", author = "Anonymous", year = 1998, isbn = "0672313413", publisher = "Sams Publishing" } @book{websecurity, title = "Web Security, Privacy \& Commerce", author = "Simson Garfinkel and Gene Spafford", year = 2001, isbn = "0596000456", publisher = "O'Reilly \& Associates Inc." } @book{internetsec, title = "Internet Security Protocols: Protecting IP Traffic", author = "Uyless Black", year = "2000", isbn = "0130142492", publisher = "Prentice-Hall Inc." } @book{practicalunix, title = "Practical Unix \& Internet Security", author = "Simson Garfinkel and Gene Spafford and Alan Schwartz", year = 2003, isbn = "0596003234", publisher = "O'Reilly \& Associates Inc." } @inproceedings{sybil, title = "The {S}ybil Attack", author = "John R. Douceur", booktitle = "Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02)", address = "Cambridge, MA, USA", month = "March 7--8", year = "2002" } @misc{rfc2093, author = "H. Harney and C. Muckenhirn", title = "{G}roup {K}ey {M}anagement {P}rotocol ({GKMP}) Specification", month = "July", year = "1997", note = "RFC 2093, Experimental" } @misc{rfc3830, author = "J. Arkko and E. Carrara and F. Lindholm and M. Naslund and K. Norrman", title = "{MIKEY}: {M}ultimedia {I}nternet {KEY}ing", month = "August", year = "2004", note = "RFC 3830, Standards Track" } % general description of IPsec @misc{rfc2401, author = "S. Kent and R. Atkinson", title = "Security Architecture for the {I}nternet {P}rotocol", month = "November", year = 1998, note = "RFC 2401, Standards Track" } % IPsec AH @misc{rfc2402, author = "S. Kent and R. Atkinson", title = "{IP} {A}uthentication {H}eader", month = "November", year = 1998, note = "RFC 2402, Standards Track" } % IPsec ESP @misc{rfc2406, author = "S. Kent and R. Atkinson", title = "{IP} {E}ncapsulating {S}ecurity {P}ayload ({ESP})", month = "November", year = 1998, note = "RFC 2406, Standards Track" } % IPsec ISAKMP @misc{rfc2408, author = "D. Maughan and M. Schertler and M. Schneider and J. Turner", title = "{I}nternet {S}ecurity {A}ssociation and {K}ey {M}anagement {P}rotocol ({ISAKMP})", month = "November", year = 1998, note = "RFC 2408, Standards Track" } % IPsec IKE @misc{rfc2409, author = "D. Harkins and D. Carrel", title = "The {I}nternet {K}ey {E}xchange ({IKE})", month = "November", year = 1998, note = "RFC 2409, Standards Track" } % collection of IPsec RFCs @book{ipsecrfcs, title = "Big Book of {IP}sec {RFC}s", author = "Pete {Loshin (compiler)}", year = 2000, isbn = "0124558399", publisher = "Morgan Kaufmann Publishers" } % IPsec wth RSA signatures @misc{ipsecrsa, author = "Brian Weis", title = "The Use of {RSA} Signatures within {ESP} and {AH}", note = "Internet-Draft, \texttt{draft-ietf-msec-ipsec-signatures-02.txt}, work in progress", month = "October", year = "2004" } @techreport{80211i, title = "Part 11: Wireless {LAN} {M}edium {A}ccess {C}ontrol ({MAC}) and {P}hysical {L}ayer ({PHY}) specifications: Amendment 6: {M}edium {A}ccess {C}ontrol ({MAC}) Security Enhancements", institution = "IEEE", year = "2004", number = "IEEE Std 802.11i-2004", key = "ieee80211i" } @misc{rfc2284, author = "L. Blunk and J. Vollbrecht", title = "{PPP} {E}xtensible {A}uthentication {P}rotocol ({EAP})", month = "March", year = "1998", note = "RFC 2284, Standards Track" } % the "evil bit", an April fool's joke :) @misc{evilbit, author = "Steven M. Bellovin", title = "The Security Flag in the {IP}v4 Header", month = "April 1", year = "2003", note = "RFC 3514, Informational (!)" } @book{ssltls, title = "SSL \& TLS Essentials: Securing the Web", author = "Stephen A. Thomas", year = "2000", isbn = "0471383546", publisher = "John Wiley \& Sons" } @book{secebiz, title = "Securing E-Business Applications and Communications", author = "Jonathan S. Held and John R. Bowers", year = "2001", isbn = "0849309638", publisher = "Auerbach Publications" } %%%%%%%%%% CRYPTOGRAPHY %%%%%%%%%% @inproceedings{dhgroup, author = "Michael Steiner and Gene Tsudik and Michael Waidner", title = "{D}iffie-{H}ellman key distribution extended to group communication", booktitle = "Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS '96)", year = "1996", isbn = "0897918290", pages = "31--37", address = "New Delhi, India", publisher = "ACM Press" } @techreport{gkaadhoc, author = "Raghav Bhaskar", title = "{G}roup {K}ey {A}greement in Ad Hoc Networks", institution = "CODES and ARLES Projects, INRIA Rocquencourt", year = "2003", month = "May", number = "INRIA RR-4832" } @misc{surveyauthp, author = "John Clark and Jeremy Jacob", title = "A Survey of Authentication Protocol Literature: Version 1.0", year = "1997", month = "November 17", } @inproceedings{effgkaadhoc, author = "Daniel Augot and Raghav Bhaskar and Valérie Issarny and Daniele Sacchetti", title = "An Efficient {G}roup {K}ey {A}greement Protocol for Ad hoc Networks", booktitle = "Proceedings of the 1st International Workshop on Trust, Security and Privacy for Ubiquitous Computing (TSPUC 2005)", month = "June 12--16", year = "2005", address = "Taormina, Italy" } @inproceedings{keymanag, author = "Laurent Eschenauer and Virgil D. Gligor", title = "A key-management scheme for distributed sensor networks", booktitle = "Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02)", year = "2002", isbn = "1581136129", pages = "41--47", address = "Washington, DC, USA", doi = "http://doi.acm.org/10.1145/586110.586117", publisher = "ACM Press" } @inproceedings{pairwisekeys, author = "Donggang Liu and Peng Ning", title = "Establishing pairwise keys in distributed sensor networks", booktitle = "Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)", year = "2003", isbn = "1581137389", pages = "52--61", address = "Washington, DC, USA", doi = "http://doi.acm.org/10.1145/948109.948119", publisher = "ACM Press", } @article{ibe, author = "Martin Gagné", title = "{I}dentity-{B}ased {E}ncryption: a Survey", journal = "RSA Laboratories CryptoBytes", volume = "6", number = "1", pages = "10--19", year = "2003" } @inproceedings{idcrypto, author = "Adi Shamir", title = "Identity-based cryptosystems and signature schemes", booktitle = "Proceedings of CRYPTO '84 on Advances in Cryptology", year = "1984", isbn = "0387156585", pages = "47--53", address = "Santa Barbara, CA, USA", publisher = "Springer-Verlag New York, Inc." } @article{ibeweil, author = "Dan Boneh and Matthew K. Franklin", title = "{I}dentity-{B}ased {E}ncryption from the {W}eil Pairing", journal = "Lecture Notes in Computer Science", volume = "2139", pages = "213--229", year = "2001", url = "citeseer.ist.psu.edu/boneh01identitybased.html" } @misc{authibe, author = "Ben Lynn", title = "Authenticated {I}dentity-{B}ased {E}ncryption", howpublished = "Cryptology ePrint Archive, Report 2002/072", year = "2002", month = "June 4" } @inproceedings{pgpgraph, author = "Sr{\dj}an \v{C}apkun and Levente Butty\'an and Jean-Pierre Hubaux", title = "Small worlds in security systems: an analysis of the {PGP} certificate graph", booktitle = "Proceedings of the 2002 Workshop on New Security Paradigms", year = "2002", pages = "28--35", address = "Virginia Beach, Virginia, USA", doi = {http://doi.acm.org/10.1145/844102.844108}, publisher = "ACM Press", } @book{appliedcrypto, title = "Applied Cryptography: Protocols, Algorithms, and Source Code in C", author = "Bruce Schneier", year = "1995", isbn = "0471128457", publisher = "John Wiley \& Sons" } @book{hbcrypto, title = "Handbook of Applied Cryptography", author = "Alfred J. Menezes and Paul C. van Oorschot and Scott A. Vanstone", year = "2001", publisher = "CRC Press", isbn = "0849385237", note = "\texttt{http://www.cacr.math.uwaterloo.ca/hac}" } @book{offpgp, title = "The Official PGP User's Guide", author = "Philip Zimmermann", year = "1995", publisher = "MIT Press", note = "\texttt{http://www.pgpi.org}" } @book{secretslies, title = "Secrets and Lies: Digital Security in a Networked World", author = "Bruce Schneier", year = "2000", isbn = "0471253111", publisher = "John Wiley \& Sons" } @book{protauthke, title = "Protocols for Authentication and Key Establishment", author = "Colin Boyd and Anish Maturia", year = "2003", isbn = "3540431071", publisher = "Springer-Verlag" } % birth of public key cryptography @article{pkcrypto, author = "Withfield Diffie and Martin Hellman", title = "New Directions in Cryptography", journal = "{IEEE} Transactions on Information Theory", pages = "644--654", volume = "22", number = "6", year = "1976", month = "November" } @inproceedings{breakingns, author = "Gavin Lowe", title = "Breaking and fixing the {N}eedham-{S}chroeder public-key protocol using {FDR}", booktitle = "Tools and Algorithms for the Construction and Analysis of Systems ({TACAS})", volume = "1055", publisher = "Springer-Verlag", pages = "147--166", year = "1996", url = "citeseer.nj.nec.com/lowe96breaking.html" } @article{nonces, title = "Using Encryption for Authentication in Large Networks of Computers", author = "Roger M. Needham and Michael D. Schroeder", journal = "Communications of the {ACM}", volume = "21", number = "12", year = 1978, month = "December", pages = "993--999" } @inproceedings{protpkc, author = "Ralph C. Merkle", title = "Protocols for Public Key Cryptosystems", booktitle = "Proceedings of the {IEEE} Symposium on Security and Privacy", address = "Oakland, CA, USA", year = "1980", month = "April 14--16" } @inproceedings{ro, author = "Mihir Bellare and Phillip Rogaway", title = "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols", booktitle = "Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS '93)", pages = "62--73", month = "November 3--5", year = "1993", address = "Fairfax, VA, USA" } @article{rorevis, author = "Ran Canetti and Oded Goldreich and Shai Halevi", title = "The random oracle methodology, revisited", journal = "Journal of the ACM", volume = "51", number = "4", month = "July", year = "2004", issn = "00045411", pages = "557--594", doi = "http://doi.acm.org/10.1145/1008731.1008734", publisher = "ACM Press" } @inproceedings{biba, author = "Adrian Perrig", title = "The {B}i{B}a one-time signature and broadcast authentication protocol", booktitle = "Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS '01)", pages = "28--37", year = "2001", url = "citeseer.ist.psu.edu/perrig01biba.html" } % HORS, improves BiBa @inproceedings{hors, author = "Leonid Reyzin and Natan Reyzin", title = "Better than {B}i{B}a: Short One-Time Signatures with Fast Signing and Verifying", booktitle = "Proceedings of the 7th Australian Conference on Information Security and Privacy", year = "2002", isbn = "3540438610", pages = "144--153", publisher = "Springer-Verlag" } % first theorical threshold schemes @article{sharesecret, title = "How to Share a Secret", author = "Adi Shamir", journal = "Communications of the {ACM}", volume = "22", number ="11", year = "1979", pages = "612--613" } @inproceedings{znproblem, title = "Practical threshold signatures", author = "Victor Shoup", booktitle = "Proceedings of Eurocrypt 2000", pages = "207--220", year = "2000" } @article{coca, author = "Lidong Zhou and Fred B. Schneider and Robbert Van Renesse", title = "{COCA}: A secure distributed online certification authority", journal = "ACM Transactions on Computer Systems", volume = "20", number = "4", year = "2002", pages = "329--368", doi = "http://doi.acm.org/10.1145/571637.571638", publisher = "ACM Press" } @article{md5status, author = "Hans Dobbertin", title = "The status of {MD}5 after a recent attack", journal = "RSA Laboratories CryptoBytes", volume = "2", number = "2", year = "1996" } @misc{attacksmd5, author = "Ondrej Mikle", title = "Practical Attacks on Digital Signatures Using {MD}5 Message Digest", howpublished = "Cryptology ePrint Archive, Report 2004/356", year = "2004" } @inproceedings{breakmd5, title = "How to Break {MD}5 and Other Hash Functions", author = "Xiaoyun Wang and Hongbo Yu", booktitle = "Proceedings of Eurocrypt 2005", address = "Aarhus, Denmark", month = "May 22--26", year = "2005" } @techreport{fips186, institution = "NIST", title = "{D}igital {S}ignature {S}tandard ({DSS})", month = "January 27", year = "2000", number = "FIPS PUB 186-2", key = "nistfips186" } @techreport{pkcsrsa, institution = "RSA Laboratories", title = "{RSA} Cryptography Standard", month = "June 14", year = "2002", note = "\texttt{ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf}", number = "{PKCS} \#1 v2.1", key = "rsa" } @article{rsa, title = "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", author = "Ronald Rivest and Adi Shamir and Leonard Adleman", journal = "Communications of the {ACM}", volume = "21", number ="2", year = "1978", month = "February", pages = "120--126" } @techreport{p1363, institution = "IEEE", title = "Standard Specifications For Public Key Cryptography", year = "2000", note = "\texttt{http://grouper.ieee.org/groups/1363/P1363}", number = "{IEEE} 1363-2000", key = "ieeep1363" } @techreport{p1363a, institution = "IEEE", title = "Standard Specifications For Public Key Cryptography - Amendment 1: Additional Techniques", year = "2004", note = "\texttt{http://grouper.ieee.org/groups/1363/P1363a}", number = "{IEEE} 1363A-20004", key = "ieeep1363a" } @misc{rfc1321, author = "R. Rivest", title = "The {MD5} {M}essage-{D}igest Algorithm", month = "April", year = "1992", note = "RFC 1321" } @techreport{sha, institution = "NIST", title = "{S}ecure {H}ash {S}ignature {S}tandard ({SHS})", month = "August 1", year = "2002", number = "FIPS PUB 180-2", key = "nistfips180" } @misc{rfc3174, author = "D. {Eastlake 3rd} and P. Jones", title = "{US} {S}ecure {H}ash {A}lgorithm 1 ({SHA1})", month = "September", year = "2001", note = "RFC 3174, Informational" } @misc{hmac, author = "H. Krawczyk and M. Bellare and R. Canetti", title = "{HMAC}: Keyed-Hashing for Message Authentication", month = "February", year = 1997, note = "RFC 2104, Informational", key = "RFC 2104" } @inproceedings{keyhash, author = "Mihir Bellare and Ran Canetti and Hugo Krawczyk", title = "Keying Hash Functions for Message Authentication", booktitle = "Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '96)", year = "1996", isbn = "3540615121", pages = "1--15", publisher = "Springer-Verlag" } @book{pubkeycrypto, title = "Public-Key Cryptography", author = "Arto Salomaa", year = 1996, isbn = "3540613560", publisher = "Springer-Verlag" } @book{rsapkcrypto, title = "RSA and Public-key cryptography", author = "Richard Mollin", year = 2003, isbn = "1584883383", publisher = "CRC Press" } @book{thecodebook, title = "The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Crytography", author = "Simon Singh", year = "1999", isbn = "0385495315", publisher = "Doubleday" } @article{bloom, title = "Space/time tradeoffs in hash coding with allowable errors", author = "B. H. Bloom", journal = "Communications of the {ACM}", volume = "13", number ="7", year = "1970", pages = "422--426" } @inproceedings{shsigweilp, author = "Dan Boneh and Ben Lynn and Hovav Shacham", title = "Short Signatures from the {W}eil Pairing", booktitle = "Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt '01)", year = "2001", month = "December 9--13", isbn = "3540429875", pages = "514--532", publisher = "Springer-Verlag", address = "Gold Coast, Australia", } @inproceedings{ibegapdh, author = "Jae Choon Cha and Jung Hee Cheon", title = "An Identity-Based Signature from Gap {D}iffie-{H}ellman Groups", booktitle = "Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography (PKC '02)", year = "2002", isbn = "354000324X", pages = "18--30", publisher = "Springer-Verlag", } @techreport{pairhisec, author = "Neal Koblitz and Alfred Menezes", title = "Pairing-based cryptography at high security levels", number = "CACR 2005-08", institution = "University of Waterloo", address = "Waterloo, Ontario, Canada", year = "2005" } @inproceedings{impltate, author = "Steven D. Galbraith and Keith Harrison and David Soldera", title = "Implementing the {T}ate Pairing", booktitle = "Proceedings of the 5th International Symposium on Algorithmic Number Theory (ANTS-V)", year = "2002", isbn = "3540438637", pages = "324--337", } @inproceedings{effpair, author = "Paulo S. L. M. Barreto and Hae Yong Kim and Ben Lynn and Michael Scott", title = "Efficient Algorithms for Pairing-Based Cryptosystems", booktitle = "Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '02)", year = "2002", isbn = "354044050X", pages = "354--368", publisher = "Springer-Verlag", } @article{cliques, author = "Michael Steiner and Gene Tsudik and Michael Waidner", title = "Key Agreement in Dynamic Peer Groups", journal = "IEEE Transactions on Parallel and Distributed Systems", volume = "11", number = "8", year = "2000", issn = "10459219", pages = "769--780", } %%%%%%%%%% GPS AND LOCALIZATION %%%%%%%%%% @techreport{netgps, author = "Gopal Dommety and Raj Jain", title = "Potential Networking Applications of {G}lobal {P}ositioning {S}ystems ({GPS})", institution = "Department of Computer and Information Science, Ohio State University", year = "1996", month = "April", number = "OSU TR-24" } @techreport{trimblegps, institution = "{Trimble Navigation Limited}", title = "Data sheet and specifications for {T}hunderbolt {GPS} Disciplined Clock", address = "Sunnyvale, CA, USA", year = "2000", note = "\texttt{http://www.trimble.com}", key = "trimble" } @inproceedings{gpsfree, title = "{GPS}-Free Positioning in Mobile ad hoc Networks", author = "Sr{\dj}an \v{C}apkun and Maher Hamdi and Jean-Pierre Hubaux", booktitle = "Proceedings of the Hawaii International Conference on System Sciences (HICSS-34)", address = "Maui, Hawaii, USA", month = "January 3--6", year = "2001", url = "citeseer.nj.nec.com/capkun01gpsfree.html" } @inproceedings{dynlocalization, author = "Andreas Savvides and Chih-Chieh Han and Mani B. Strivastava", title = "Dynamic fine-grained localization in Ad-Hoc networks of sensors", booktitle = "Proceedings of the 7th Annual International Conference on Mobile Computing and Networking", year = "2001", month = "July 16--21", isbn = "1581134223", pages = "166--179", address = "Rome, Italy", publisher = "ACM Press" } % ACM was asked not to use its traditional name (MobiCom) in Italy on penalty of law since it is an existing Italian trademark % fixes the attack against SRP pointed out by Marshall @inproceedings{spaar, author = "Stephen Carter and Alec Yasinsac", title = "{S}ecure {P}osition {A}ided {A}d hoc {R}outing", booktitle = "Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN '02)", pages = "329--334", month = "November 4--6", year = "2002" } @inproceedings{dream, author = "Stefano Basagni and Imrich Chlamtac and Violet R. Syrotiuk and Barry A. Woodward", title = "A {D}istance {R}outing {E}ffect {A}lgorithm for {M}obility ({DREAM})", booktitle = "Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '98)", year = "1998", pages = "76--84", address = "Dallas, TX, USA", doi = "http://doi.acm.org/10.1145/288235.288254", publisher = "ACM Press" } @inproceedings{lar, author = "Young-Bae Ko and Nitin H. Vaidya", title = "{L}ocation-{A}ided {R}outing ({LAR}) in mobile ad hoc networks", booktitle = "Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '98)", year = "1998", pages = "66--75", address = "Dallas, TX, USA", doi = "http://doi.acm.org/10.1145/288235.288252", publisher = "ACM Press" } @inproceedings{gpsr, author = "Brad Karp and H. T. Kung", title = "{GPSR}: {G}reedy {P}erimeter {S}tateless {R}outing for wireless networks", booktitle = "Mobile Computing and Networking", pages = "243--254", year = "2000", url = "citeseer.ist.psu.edu/karp00gpsr.html" } @inproceedings{whereyouare, author = "Eran Gabber and Avishai Wool", title = "How to prove where you are: tracking the location of customer equipment", booktitle = "Proceedings of the 5th {ACM} Conference on Computer and Communications Security (CCS '98)", year = "1998", isbn = "1581130074", pages = "142--149", address = "San Francisco, CA, USA", doi = "http://doi.acm.org/10.1145/288090.288121", publisher = "ACM Press" } % end of file