메뉴 건너뛰기




Volumn 3, Issue , 2003, Pages 1976-1986

Packet leashes: A defense against wormhole attacks in wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

LOCATION BASED; MOBILE AD HOC; PACKET LEASHES; SPECIFIC PROTOCOL; WIRELESS SECURITY SYSTEMS; WORMHOLE ATTACK;

EID: 0041973497     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2003.1209219     Document Type: Conference Paper
Times cited : (1204)

References (44)
  • 1
    • 0002431508 scopus 로고
    • The ALOHA system-another alternative for computer communications
    • November
    • Norman Abramson. The ALOHA System-Another Alternative for Computer Communications. In Proceedings of the Fall 1970 AFIPS Computer Conference, pages 281-285, November 1970.
    • (1970) Proceedings of the Fall 1970 AFIPS Computer Conference , pp. 281-285
    • Abramson, N.1
  • 2
    • 0042034264 scopus 로고    scopus 로고
    • Allentown, PA. Available at
    • Agere Systems Inc. Specification sheet for ORiNOCO World PC Card. Allentown, PA. Available at ftp://ftp.orinocowireless.com/pub/docs/ORINOCO/ BROCHURES/US/World%20PC%20Card%20US.pdf.
    • Specification Sheet for ORiNOCO World PC Card
  • 4
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Advances in Cryptology - CRYPTO '96
    • Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying Hash Functions for Message Authentication. In Advances in Cryptology - CRYPTO '96, edited by Neal Koblitz, volume 1109 of Lecture Notes in Computer Science, pages 1-15. Springer-Verlag, Berlin Germany, 1996. (Pubitemid 126106226)
    • (1996) Lecture Notes in Computer Science , Issue.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 9
    • 0012609256 scopus 로고    scopus 로고
    • Tom Clark Green-belt, Maryland. Available at
    • Tom Clark. Tom Clark's Totally Accurate Clock FTP Site. Green-belt, Maryland. Available at ftp://aleph.gsfc.nasa.gov/GPS/totally.accurate.clock/.
    • Tom Clark's Totally Accurate Clock FTP Site
  • 13
    • 0022793132 scopus 로고
    • How to construct random functions
    • October
    • Oded Goldreich, Shafi Goldwasser, and Silvio Micali. How to Construct Random Functions. Journal of the ACM, 33(4):792-807, October 1986.
    • (1986) Journal of the ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 14
    • 0004147444 scopus 로고    scopus 로고
    • Summer Course "Cryptography and Computer Security," at MIT, 1996-1999, August
    • Shafi Goldwasser and Mihir Bellare. Lecture Notes on Cryptography. Summer Course "Cryptography and Computer Security" at MIT, 1996-1999, August 1999.
    • (1999) Lecture Notes on Cryptography
    • Goldwasser, S.1    Bellare, M.2
  • 18
    • 0003580691 scopus 로고    scopus 로고
    • IEEE Computer Society LAN MAN Standards Committee IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, New York
    • IEEE Computer Society LAN MAN Standards Committee. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, New York, 1997.
    • (1997) Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
  • 19
    • 0001341422 scopus 로고    scopus 로고
    • The dynamic source routing protocol for multihop wireless ad hoc networks
    • edited by Charles E. Perkins, chapter 5 Addison-Wesley
    • David B. Johnson, David A. Maltz, and Josh Broch. The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. In Ad Hoc Networking, edited by Charles E. Perkins, chapter 5, pages 139-172. Addison-Wesley, 2001.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2    Broch, J.3
  • 23
    • 0035704362 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad-hoc networks
    • Jiejun Konh, Petros Zerfos, Haiyun Luo, Songwu Lu, and Lixia Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In Proceedings of the Ninth International Conference on Network Protocols (ICNP 2001), pages 251-260, November 2001. (Pubitemid 34099990)
    • (2001) International Conference on Network Protocols , pp. 251-260
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 24
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • November
    • Leslie Lamport. Password Authentication with Insecure Communication. Communications of the ACM, 24(11):770-772, November 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 25
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • DOI 10.1007/s00145-001-0009-4
    • Arjen K. Lenstra and Eric R. Verheul. Selecting Cryptographic Key Sizes. Journal of Cryptology: The Journal of the International Association for Cryptologic Research, 14(4):255-293, September 2001. Available at http://www.cryptosavvy.com/. (Pubitemid 33770276)
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 35
    • 0041532995 scopus 로고    scopus 로고
    • Sunnyvale, CA. Available at
    • Proxim, Inc. Data sheet for Proxim Harmony 802.11a CardBus Card. Sunnyvale, CA. Available at http://www.proxim.com/products/all/harmony/docs/ds/ harmony-11a-cardbus.pdf.
    • Data Sheet for Proxim Harmony 802.11a CardBus Card
  • 36
    • 0003491910 scopus 로고    scopus 로고
    • Multipoint relaying: An efficient technique for flooding in mobile wireless networks
    • Project HIPERCOM, INRIA, February
    • Amir Qayyum, Laurent Viennot, and Anis Laouiti. Multipoint Relaying: An Efficient Technique for flooding in Mobile Wireless Networks. Technical Report Research Report RR-3898, Project HIPERCOM, INRIA, February 2000.
    • (2000) Technical Report Research Report RR-3898
    • Qayyum, A.1    Viennot, L.2    Laouiti, A.3
  • 37
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • Ron L. Rivest, Adi Shamir, and Leonard M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 38
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Claus P. Schnorr. Efficient Signature Generation by Smart Cards. Journal of Cryptology, 4(3):161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 40
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • edited by B. Christianson, B. Crispo, and M. Roe. Springer-Verlag, Berlin Germany
    • Frank Stajano and Ross Anderson. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In Security Protocols, 7th International Workshop, edited by B. Christianson, B. Crispo, and M. Roe. Springer-Verlag, Berlin Germany, 1999.
    • (1999) Security Protocols, 7th International Workshop
    • Stajano, F.1    Anderson, R.2
  • 44
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • DOI 10.1109/65.806983
    • Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, 13(6):24-30, November/December 1999. (Pubitemid 30526484)
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.