메뉴 건너뛰기




Volumn , Issue , 2004, Pages 257-264

Tactical bandwidth exhaustion in ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; DENIAL OF SERVICE (DOS); MEDIA ACCESS CONTROL (MAC); TACTICAL BANDWIDTH EXHAUSION;

EID: 15944408818     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (15)
  • 2
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • J. Bellardo and S. Savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," Proceeding of the USENIX Security Symposium, pp. 15-28, 2003.
    • (2003) Proceeding of the USENIX Security Symposium , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 4
    • 84903836776 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
    • P. Ning and K. Sun, "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols," Proceeding of the 4th Annual IEEE Information Assurance Workshop, pp. 60-67, 2003.
    • (2003) Proceeding of the 4th Annual IEEE Information Assurance Workshop , pp. 60-67
    • Ning, P.1    Sun, K.2
  • 6
    • 0037003792 scopus 로고    scopus 로고
    • Denial of service attacks at the mac layer in wireless ad hoc networks
    • V. Gupta, S. Krishnamurthy, and M. Faloutsos, "Denial of service attacks at the mac layer in wireless ad hoc networks," Proceeding of MILCOM 2002, vol. 2, pp. 1118-1123, 2002.
    • (2002) Proceeding of MILCOM 2002 , vol.2 , pp. 1118-1123
    • Gupta, V.1    Krishnamurthy, S.2    Faloutsos, M.3
  • 12
    • 0034268810 scopus 로고    scopus 로고
    • IEEE 802.11 protocol: Design and performance evaluation of an adaptive backoff mechanism
    • F. Cali, M. Conti, and E. Gregori, "IEEE 802.11 Protocol: Design and Performance Evaluation of an Adaptive Backoff Mechanism," IEEE Journal on Selected Areas in Communications, vol. 18, pp. 1774-1786, 2000.
    • (2000) IEEE Journal on Selected Areas in Communications , vol.18 , pp. 1774-1786
    • Cali, F.1    Conti, M.2    Gregori, E.3
  • 13
    • 15944373266 scopus 로고    scopus 로고
    • Modeling, analysis and simulation of resource competition among nodes in a small ad hoc network
    • Cyber Security Group, School of Information Sciences and Technology, Pennsylvania State University
    • Q. Gu, P. Liu, and C. H. Chu, "Modeling, Analysis and Simulation of Resource Competition among Nodes in a Small Ad Hoc Network," Cyber Security Group, School of Information Sciences and Technology, Pennsylvania State University, Technical Report TR-S2-03-04, 2003.
    • (2003) Technical Report , vol.TR-S2-03-04
    • Gu, Q.1    Liu, P.2    Chu, C.H.3
  • 14


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.