3rd Generation Partnership Project: Technical Specification Group (Services and System Aspects) 3G Security; Specifications of A5/3 Encryption Algorithms for GSM and ECSD, and the GEA3 Encryption Algorithm for GPRS; Document 1:A5/3 and GEA3 Specifications (Release 6)
, 3GPP TS 55.216, ver. 6.2.0, 2003.
3GPP Technical Specifications
IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corrigendum 1
, IEEE Std 802.16e-2005 and IEEE Std 802.16-2004/Cor 1-2005 (Amendment and Corrigendum to IEEE Std 802.16-2004), 2006, pp. 0_1–822.
IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems
, IEEE Std 802.16-2004 (Revision of IEEE Std 802.16-2001), 2004, pp. 0_1–857.
Intrusion Detection Exchange Format (idwg)
A. B. Smith, “An examination of an intrusion detection architecture for wireless ad hoc networks,” 5th National Colloquium for Information System Security Education
, May 2001.
A. Fasbender, D. Kesdogan, and O. Kubitz, “Variable and scalable security: protection of location information in mobile IP,” Mobile Technology for the Human Race, IEEE 46th Vehicular Technology Conference, 1996.
A. Mishra and K. M. Nadkarni, “Security in wireless ad hoc networks – a survey,” in The Handbook of Ad Hoc Wireless Networks (M. Ilyas, Editor), CRC Press, 2002, chap. 30.
A. Mishra, K. Nadkarni, and A. Patcha, “Intrusion detection in wireless ad hoc networks,” IEEE Wireless Communications, vol. 11, no. 1, Feb. 2004, pp. 48–60.
B. Bing, Wireless Local Area Networks, John Wiley and Sons, 2002.
B. R. Smith, S. Murthy, and J. J. Garcia-Luna-Aceves, Securing Distance-Vector Routing Protocols
B. Rathgeb and C. Qiang, Utilizing the IEEE 802.16 Standard for Homeland Security Applications, Proc. SPIE Defense and Security Symposiun: Technologies for Homeland Security and Law Enforcement, Orlando, FL, USA, 2005.
Bluetooth SIG, Bluetooth – Specification of the Bluetooth System
, vol. 1, core, ver. 1.1.
C. Bisdikian, “An overview of the Bluetooth wireless technology,” IEEE Commun. Mag
., Dec. 2001, pp. 86–94. (For additional sources of comprehensive information on Bluetooth, see the official websites, www.bluetooth.com/
; an excellent compendium of tutorials and references is available at http://kjhole.com/Standards/Intro.html.
C. Bisdikian, P. Bhagwat, B. Gaucher, et al
., “WiSAP – A wireless personal access network for handheld computing devices,” IEEE Personal Commun., vol. 5, no. 6, 1998, pp. 18–25.
C. Cicconetti, L. Lenzini, E. Mingozzi, and C. Eklund, “Quality of service support in IEEE 802.16 networks,” IEEE Network, vol. 20, 2006, pp. 50–55.
C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA ‘99), Feb. 1999, pp. 90–100.
C. E. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance vector routing,” ACM SIGCOMM Computer Commun. Rev., Oct. 1994, pp. 234–244.
C. E. Perkins, E. M. Royer, and S. R. Das, Ad Hoc On-demand Distance Vector Routing
, Oct. 1999 IETF Draft.
C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and counter measures,” in First IEEE Int. Workshop on Sensor Network Protocols and Applications, 2003, pp. 113–127.
C. Perkins, E. M. Royer, and S. R. Das, Ad Hoc On-Demand Distance Vector (AODV) Routing
. IETF draft, www3.tools.ietf.org/html/draft-ietf-manet-aodv-06
C. R. Lin and M. Gerla, “MACA/PR: an asynchronous multimedia multihop wireless network,” Proc. 16th Annual Joint Conf. IEEE Comp. Commun. Soc. (INFOCOM 1997), vol. 1, 1997, pp. 118–125.
C. S. Ram Murthy and B. S. Manoj, Ad Hoc Wireless Networks –Architecture and Protocols, Prentice Hall, 2004.
D. B. Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” in Mobile Computing (T. Imielinski and H. Korth, Editors), Kluwer Academic Publishers, 1996, pp. 153–181.
D. B. Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” in Mobile Computing, (T. Imielinski and H. Korth, Editors), Kluwer Academic Publishers, 1996, chap. 5, pp. 153–181.
D. B. Johnson and D. A. Maltz, “Protocols for adaptive wireless and mobile networking,” IEEE Personal Commun., Feb. 1996, pp. 34–42.
D. Boneh, R. DeMillo, and R. Lipton, “On the importance of checking cryptographic protocols for faults,” in Proc. Eurocrypt'97, 1997, pp. 37–51.
D. Harkins and D. Carrel, The Internet Key Exchange (IKE)
, Nov. 1998.
D. Johnston and J. Walker, “Overview of IEEE 802.16 security,” IEEE Security & Privacy, vol. 2, 2004, pp. 40–48.
D. Maughan, M. Schertler, M. Schneider, and J. Turner, Internet Security Association and Key Management Protocol (ISAKMP)
, Nov. 1998.
D. Pareek, The Business of WiMAX, John Wiley and Sons, New York, 2007.
E. Chien and P. Szor, “Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses
,” Symantec white paper, www.symantec.com/avcenter/reference/blended.attacks.pdf
E. Crawley, R. Nair, B. Rajagopalan, and H. Sandick, “A Framework for QoS-based Routing in the Internet,” RFC 2386, http://www.ietf.org/rfc/rfc2386.txt
, Aug. 1998.
E. M. Royer, and C.-K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks,” IEEE Personal Commun., Apr. 1999, pp. 46–55.
ETSI, Digital Cellular Telecommunications System (Phase 2 +), General Packet Radio Service (GPRS); Service Description; Stage 2, GSM 03.60, ver. 6.4.0
F. A. Tobagi and L. Kleinrock, “Packet switching in radio channels ― part 2: the hidden terminal problem in carrier sense multiple-access and the busy tone solution,” IEEE Trans. Commun., vol. COM-23, Dec. 1985, pp. 1417–1433.
F. Bennett, D. Clarke, J. B. Evans, et al
., “Piconet: embedded mobile networking,” IEEE Personal Commun., vol. 4, no. 5, Oct. 1997, pp. 8–15.
F. Stajano and R. Anderson, “The resurrecting duckling: security issues for ad-hoc wireless networks,” in Proc. 7th International Workshop on Security Protocols, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Germany, Apr. 1999. Available from www.cl.cam.ac.uk/~fms27/duckling/duckling.html
F. Stajano, “The resurrecting duckling – what next?” Proc. 8th International Workshop on Security Protocols, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Germany, April 2000. Available from www.cl.cam.ac.uk/~fms27/duckling/ duckling-what-next.html
For extensive additional information on routing in mobile ad hoc networks, including QoS routing, see, inter alia, the web pages of the MONET group (including K. Nahrstedt: http://cairo.cs.uiuc.edu/~klara/home.htm
, Shigang Chen: www.cise.ufl.edu/~sgchen
, Baochun Li, now at U. of Toronto: www.eecg.toronto.edu/~bli/research.html
), the CEDAR group (including V. Bharghavan: http://timely.crhc.uiuc.edu/index.html
) of University of Illinois at Urbana-Champaign, of the Terminodes project at the Swiss Federal Institute of Technology (including: J.-P. Hubaux: http://people.epfl.ch/jean-pierre.hubaux
), and the INSIGNIA team at Columbia University (including A. T. Campbell: www.cs.dartmouth.edu/~campbell/
). This is only a representative list; there are many others.
H. Kaaranen, A. Ahitiainen, L. Laitinen, S. Naghian, and V. Niemi, UMTS Networks: Architecture, Mobility, and Services, John Wiley and Sons, 2001.
H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication
, Feb. 1997.
H. Luo and S. Lu, Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks
, Technical Report TR-200030, Dept. of Computer Science, UCLA, 2000.
I. Stojmenovic (Editor), Handbook of Wireless Networks & Mobile Computing, John Wiley and Sons, 2002.
IEEE 802.11 Study Group, http://groupr.ieee.org/groups/802/11.
IEEE Standard 802.11, 1999 Edition (R2003) (ISO/IEC 8802–11:1999), IEEE Standard for Information Technology – Telecommunications and Information Exchange between Systems – Local And Metropolitan Area Network Specification Requirements – Part II. Wireless LAN Medium Aceess Control (MAC) and Physical Layer (PHY) Specifications
J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, “A performance comparison of multi-hop wireless ad hoc network routing protocols,” Proc. 4th Annual ACM/IEEE Intl. Conf. on Mobile Computing and Networking (MobiCom '98)
, Dallas, TX, Oct. 25–30, 1998, pp. 85–97.
J. J. Quisquater and D. Samyde, “ElectroMagneticAnalysis (EMA): measures and counter-measures for smart cards,” Lecture Notes Comp. Sci. (Smart Card Programming and Security)
, vol. 2140, 2001, pp. 200–210.
J. Kelsey, B. Schneier, and D. Wagner, “Protocol interactions and the chosen protocol attack,” in Proc. Int. Workshop on Security Protocols, 1997, pp. 91–104.
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for mobile ad-hoc networks,” 9th IEEE International Conference on Network Protocols
, Riverside, CA, Nov. 2001, pp. 251–260.
J. L. Sobrinho and A. S. Krishnakumar, “Quality-of-service in ad hoc carrier sense multiple access wireless networks,” IEEE J. Select. Areas Commun., vol. 17, No. 8, Aug. 1999, pp. 1353–1414.
J. Myers, Simple Authentication and Security Layer (SASL)
, Oct. 1997.
J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil attack in sensor networks: analysis and defenses,” 3rd Int. Symposium on Information Processing in Sensor Networks, 2003, pp. 171–179.
J. P. Conti, “The long road to WiMAX [wireless MAN standard],” IEE Review, vol. 51, 2005, pp. 38–42.
J.-P. Hubaux, L. Buttyán, and S. Čapkun, “The quest for security in mobile ad hoc networks,” Proc. 2001 ACM Intl. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc '01), 2001, pp. 146–155.
K. J. Negus, J. Waters, J. Tourrilhes, et al
., “HomeRF and SWAP: wireless networking for the connected home,” ACM SIGMOBILE Mobile Computing and Commun. Rev., vol. 2, no. 4, Oct. 1998, pp. 28–37.
K. Nadkarni and A. Mishra, “A novel intrusion detection scheme for wireless ad hoc networks,” IEEE WCNC '04, vol. 2, Mar. 2004, p. 831.
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, “A secure routing protocol for ad hoc networks,” Proc. ICNP
, Nov. 2002, pp. 78–87.
K. Wu and J. Harms, “QoS support in mobile ad hoc networks,” Crossing Boundaries, vol. 1, no. 1, Fall 2001, pp. 92–106.
L. Buttyan and J. P. Hubaux, “Enforcing service availability in mobile ad hoc WANs,” 1st MobiHoc
, Boston, Massachusetts, Aug. 2000.
L. Nuaymi, WiMAX – Technology for Broadband Wireless Access, John Wiley and Sons, New York, 2007.
L. Venkatraman and D. P. Agrawal, “A novel authentication scheme for ad-hoc networks,” 2nd IEEE Wireless Communications and Networking Conference
, Chicago, Sep. 2000.
M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized trust management,” IEEE Symposium on Security and Privacy, May 1996, pp. 164–173.
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, The KeyNote Trust-Management System Version 2
, Sep. 1999.
M. Donahoo and B. Steckler, Emergency Mobile Wireless Networks, Proc. IEEE MILCOM, Atlantic City, NJ, USA, 2005.
M. G. Zapata and N. Asokan, “Securing ad hoc routing protocol,” Proc. ACM WiSe
, Atlanta, GA, Sep. 2002, pp. 1–10.
M. Ilyas (Editor), The Handbook of Wireless Ad Hoc Networks, CRC Press, 2003.
M. Jiang, J. Li, and Y. C. Tay, “Cluster Based Routing Protocol
, Aug 1999.
M. Mauve, J. Widner, and H. Hartenstein, “A survey on position-based routing in mobile ad-hoc networks,” IEEE Network, vol. 16, Nov.–Dec. 2001, pp. 30–39.
M. O. Rabin, “Efficient dispersal of information for security, load balancing, and fault tolerance,” J. ACM vol. 36, no. 2, Dec. 2002, pp. 335–348.
N. Asokan and P. Ginzboorg, “Key agreement in ad hoc networks,” Computer Communications, vol. 23, 2000, pp. 1627–1637.
National Institute of Standards and Technology, www.nist.gov
O. Kachirski and R. Guha, “Intrusion detection using mobile agents in wireless ad hoc networks,” IEEE Workshop on Knowledge Media Networking, 10–12 Jul. 2002, pp. 153–158.
P. Albers, O. Camp, J.-M. Percher, et al
., “Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches,” 1st International Workshop on Wireless Information Systems, 4th International Conference on Enterprise Information Systems, Ciudad Real, 3–6 Apr. 2002.
P. C. Kocher, “Timing attacks on implementations of Diffie–Hellman, RSA, DSS, and other systems,” Advances in Cryptology – CRYPTO'96, Springer-Verlag Lecture Notes in Computer Science, vol. 1109, 1996, pp. 104–113.
P. Eronen, C. Gehrmann, and P. Nikander, Securing Ad Hoc Jini Services
P. Kocher, J. Jaffe, and B. Jun, “Introduction to Differential Power Analysis and Related Attacks
P. Papadimitratos and Z. J. Haas, “Secure Message Transmission in Mobile Ad Hoc Networks,” in Handbook of Wireless Ad Hoc Networks, (M. Ilyas, Editor), CRC Press, 2003.
P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks,” SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002)
, San Antonio, TX, Jan. 27–31, 2002.
P. Papadimitritos and Haas, Z. “Securing mobile ad hoc networks,” in The Handbook of Ad hoc Wireless Networks, (M. Ilyas, Editor), CRC Press, 2003.
P. Rogaway, www.cs.ucdavis.edu/~rogaway
R. Anderson and M. Kuhn, “Tamper resistance – a cautionary note”, in Proc. Second USENIX Workshop on Electronic Commerce, Oakland, CA, 1996, pp. 1–11.
R. Housely and D. Whiting, Temporal Key Hash
, IEEE Standard 802.11-01/550.
R. Housely, D. Whiting, and N. Fergusen, AES-CTR-Mode-with-CBC-MAC
R. Housely, D. Whiting, and N. Ferguson, Alternative Temporal Key Hash
, IEEE Standard 802.11i, 11-02-282r0.
R. R. S. Verma, D. O'Mahony, and H. Tewari, NTM – Progressive Trust Negotiation in Ad Hoc Networks
R. Ramanathan and M. Steenstrup, “Hierarchically-organized, multihop mobile wireless networks for quality-of-service support,” ACM/Baltzer Mobile Networks and Applications, vol. 3, no. 1, Jun. 1998, pp. 101–119.
R. Ramanujan, A. Ahamad, J. Bonney, R. Hagelstrom, and K. Thurber, “Techniques for intrusion-resistant ad hoc routing algorithms (TIARA),” 21st Century Military Communications Conference Proceedings, vol. 2, 22–25 Oct. 2000, pp. 660–664.
S. Axelsson, Intrusion Detection Systems: A Taxomomy and Survey
, Technical report no. 99–15, Dept. Computer Engineering, Chalmers University of Technology, Sweden, Mar. 2000.
S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic (Editors), Mobile Ad Hoc Networking, John Wiley and Sons, 2004.
S. Bhargava and D. P. Agrawal, “Security enhancements in AODV protocol for wireless ad hoc networks,” 54th Vehicular Technology Conference, vol. 4, 7–11 Oct. 2001, pp. 2143–2147.
S. Chakrabarti and A. Mishra, “QoS issues in ad hoc wireless networking,” IEEE Communication Magazine, vol. 39, no. 2, Feb. 2001, pp. 142–148.
S. Chakrabarti and A. Mishra, “Quality of service challenges for wireless mobile ad hoc networks,” Wireless Communication and Mobile Computing, vol. 3, no. 4, Sep. 2003, pp. 921–945.
S. Chakrabarti and A. Mishra, “Quality of service in mobile ad hoc networks,” in CRC Handbook of Wireless Ad Hoc Networks, (M. Ilyas, Editor), CRC Press, 2002.
S. Chakrabarti and A. Mishra, “Quality of service in mobile ad hoc networks,” in The Handbook of Ad hoc Wireless Networks, (M. Ilyas, Editor), CRC Press, 2003.
S. Chen and K. Nahrstedt, “An overview of quality-of-service routing for the next generation high-speed networks: problems and solutions,” IEEE Network, Nov.–Dec. 1998, pp. 64–79.
S. Chen and K. Nahrstedt, “An overview of quality-of-service routing for the next generation high-speed networks: problems and solutions,” IEEE Network, Nov.–Dec. 1998, pp. 64–79.
S. Chen, “Routing Support for Providing Guaranteed End-to-End Quality-of-Service
,” Ph.D. thesis, Urbana, Illinois: University of Illinois at Urbana-Champaign, 1999.
S. Frankel, R. Glenn, and S. Kelly, “The AES-CBC Cipher Algorithm and Its Use with IPSec
S. Govindavajhala and A. W. Appel, “Using memory errors to attack a virtual machine,” in Proc. IEEE Symposium on Security and Privacy, 2003, pp. 154–165.
S. H. Shah and K. Nahrstedt, Predictive Location-Based QoS Routing in Mobile Ad Hoc Networks
, Technical Report UIUCDCS-R-2001-2242 – UILU-ENG-2001-1749, Dept. of Computer Science, University of Illinois at Urbana-Champaign, September, 2001; in Proc. IEEE Intl. Conf. Commun. (ICC ‘02)
, New York, NY, Apr. 28-May 2, 2002.
S. Jacobs and M. S. Corson, MANET Authentication Architecture
S. Jacobs, Mobile IP Public Key Based Authentication
, Internet draft, IETF, www3.tools.ietf.org/html/draft-jacobs-mobileip-pki-auth-02
, Mar. 1999.
S. Levijoki, Authentication, Authorization and Accounting in Ad Hoc Networks
S. Mäki, M. Hietalahti, and T. Aura, A Survey of Ad-Hoc Network Security
, Interim report of project 007 – Security of Mobile Agents and Ad-Hoc Societies, Helsinki University of Technology. Laboratory for Theoretical Computer Science, Sep. 2000.
S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, United States, pp. 255–265.
S. Marti, T. J. Giuli, K. Lai, and M. Baker. “Mitigating routing misbehavior in mobile ad hoc networks,” 6th International Conference on Mobile Computing and Networking(MOBICOM'00), Aug 2000, pp. 255–265.
S. Ravi, A. Raghunathan, and S. Chakradhar, “Embedding security in wireless embedded systems,” in Proc. Int. Conf. VLSI Design, 2003, pp. 269–270.
S. Ravi, A. Raghunathan, and S. Chakradhar, “Tamper resistance mechanisms for secure, embedded systems,” 17th International Conference on VLSI Design, 2004, p. 605.
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, “Security in embedded systems: design challenges,” ACM Transactions Embedded Computer System, vol. 3, no. 3, 2004, pp. 461–491.
S. Yi, P. Naldurg, and R. Kravets, Security-Aware Ad-Hoc Routing for Wireless Networks
, UIUCDCS-R-2001-2241 Technical Report, Aug. 2001.
T. Moore and C. Chaplin, TGi Security Overview
, IEEE Standard 802.11i, 10-02-114r1.
T.-W. Chen, “Efficient Routing and Quality of Service Support for Ad Hoc Wireless Networks
,” Ph.D. dissertation, Los Angeles, CA: University of California at LA, 1998.
W. Van Eck, “Electromagnetic radiation from video display units: an eavesdropping risk?,” Comput. Secur., vol. 4, no. 4, 1985, pp. 269–286.
WiMax, IEEE 802.16a Standard and WiMAX Igniting Broadband Wireless Access
, White paper, www.wimaxforum.org/news/downloads/WiMAXWhitepaper.pdf
Y. Hu, A. Perrig, and D. B. Johnson, “Ariadne: a secure on-demand routing protocol for ad hoc networks,” Proc
. 8th ACM Mobicom
, Atlanta, GA, Sep. 2002, pp. 12–23.
Y. Okazaki, I. Sato, and S. Goto, “A new intrusion detection method based on process profiling,” Symposium on Applications and the Internet, 28 Jan.–1 Feb. 2002, pp. 82–90.
Y. Zhang and W. Lee, “Intrusion detection in wireless ad-hoc networks,” 6th International Conference on Mobile Computing and Networking (MOBICOM'00), Aug. 2000, pp. 275–283.
Y. Zhang, W. Lee, and Y.-A. Huang, “Intrusion detection techniques for mobile wireless networks,” ACM J. Wireless Networks, vol. 9, no. 5, Sep. 2003, pp. 545–556.
Z. Abichar, P. Yanlin, and J. M. Chang, “WiMax: the emergence of wireless broadband,” IT Professional, vol. 8, 2006, pp. 44–48.
Z. J. Haas and M. R. Pearlman, “Determining the optimal configuration for the zone routing protocol,” IEEE J. Select. Areas Commun., vol. 17, no. 8, Aug. 1999, pp. 1395–1414.
Z. J. Haas, M. Gerla, D. B. Johnson, et al
., “Guest editorial,” IEEE J. Select. Areas Commun., Special issue on wireless networks, vol. 17, no. 8, Aug. 1999, pp. 1329–1332.