메뉴 건너뛰기




Volumn 2865, Issue , 2003, Pages 140-150

Preventing replay attacks for secure routing in ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; ROUTERS; ROUTING PROTOCOLS; TELECOMMUNICATION NETWORKS; WIRELESS AD HOC NETWORKS;

EID: 0142187757     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-39611-6_13     Document Type: Article
Times cited : (50)

References (18)
  • 10
    • 0035789243 scopus 로고    scopus 로고
    • Security-Aware Ad hoc Routing for Wireless Networks
    • S. Yi, P. Naldurg and R. Kravets, "Security-Aware Ad hoc Routing for Wireless Networks," Proc. ACM Mobihoc, 2001.
    • (2001) Proc. ACM Mobihoc
    • Yi, S.1    Naldurg, P.2    Kravets, R.3
  • 12
    • 0004118143 scopus 로고    scopus 로고
    • A Secure Routing Protocol for Ad Hoc Networks
    • University of Massachusetts, Department of Computer Science, Aug.
    • B. Dahill, B. Levine, E. Royer and C. Shields, "A Secure Routing Protocol For Ad Hoc Networks," Technical Report UM-CS-2001-037, University of Massachusetts, Department of Computer Science, Aug. 2001.
    • (2001) Technical Report UM-CS-2001-037
    • Dahill, B.1    Levine, B.2    Royer, E.3    Shields, C.4
  • 13
    • 0004118144 scopus 로고    scopus 로고
    • Nuglets: A Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks
    • Swiss Federal Institute of Technology-Lausanne, Department of Communication Systems, Jan.
    • L. Buttyan and J. Hubauz, "Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks," Technical Report DSC/2001/001, Swiss Federal Institute of Technology-Lausanne, Department of Communication Systems, Jan. 2001.
    • (2001) Technical Report DSC/2001/001
    • Buttyan, L.1    Hubauz, J.2
  • 14
    • 35248853957 scopus 로고    scopus 로고
    • The Selfish Node: Increasing Routing Security for Mobile Ad Hoc Networks
    • May
    • S. Buchegger and J. L. Boudec, "The Selfish Node: Increasing Routing Security for Mobile Ad Hoc Networks," IBM Research Report RR 3354, May 2001.
    • (2001) IBM Research Report RR 3354
    • Buchegger, S.1    Boudec, J.L.2
  • 15
    • 0034449688 scopus 로고    scopus 로고
    • Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA)
    • Los Angeles, Oct.
    • R. Ramanujan and A. Ahamad, "Techniques For Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA)," Proc. MILCOM 2000, Los Angeles, Oct. 2000.
    • (2000) Proc. MILCOM 2000
    • Ramanujan, R.1    Ahamad, A.2
  • 16
    • 0012575586 scopus 로고    scopus 로고
    • Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks
    • Rice University Department of Computer Science, Dec.
    • Y. Hu, A. Perrig and D. B. Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks," Technical Report TR01-384, Rice University Department of Computer Science, Dec. 2001.
    • (2001) Technical Report TR01-384
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.