Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
Efficient and Secure Conference-Key Distribution
Proceedings of the International Workshop on Security Protocols
Personal security environment on Palm PDA
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
CLIQUES: A New Approach to Group Key Agreement
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
The Performance Measurement of Cryptographic Primitives on Palm Devices
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Exploring Robustness in Group Key Agreement
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
A method for fast revocation of public key certificates and security capabilities
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
An Evaluation Study of Mobile Agent Technology: Standardization, Implementation and Evolution
ICMCS '99 Proceedings of the 1999 IEEE International Conference on Multimedia Computing and Systems - Volume 02
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
Hi-index | 0.00 |
Secure mobile wireless ad-hoc networks are frequentlydescribed in the technical literature as highly-desired andfeasible. However only few stable and scalable physicalrealizations of such MANETs were actually reported. Inthis paper, we describe SWAT (a secure wireless agent-basedtestbed), a physical network of handheld and stationarycomputing nodes that provide a practical industrial-strengthMANET based on IEEE standard 802.11b andagent technology. The system, using HP iPAQ units andtablet PCs, implements secure group-based applicationsand allows for real-time user revocation. It integrates algorithmsand techniques from several proposed software libraries,including CLIQUES, Spread and Secure Spread,SEM, IPSec, and EMAA.