메뉴 건너뛰기




Volumn 2, Issue , 2005, Pages 657-662

Resisting Flooding Attacks in Ad Hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; BROADCASTING; COMMUNICATION SYSTEMS; MOBILE COMPUTING; NETWORK PROTOCOLS; ROUTERS;

EID: 24744451603     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (91)

References (21)
  • 1
    • 0003247337 scopus 로고    scopus 로고
    • Mobile Ad hoc Networking (MANET): Routing protocol performance issues and evaluation considerations
    • January
    • S. Corson,J. Macker,Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations.RFC 2501,January 1999
    • (1999) RFC , vol.2501
    • Corson, S.1    Macker, J.2
  • 3
    • 0036343692 scopus 로고    scopus 로고
    • Detecting SYN flooding attacks
    • New York City
    • Haining Wang, Danlu Zhang, and Kang G. Shin, Detecting SYN Flooding Attacks, IEEE INFOCOM'2002, New York City, 2002
    • (2002) IEEE INFOCOM'2002
    • Wang, H.1    Zhang, D.2    Shin, K.G.3
  • 6
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key Management for mobile ad hoc networks
    • January-March
    • Srdjan Capkun, Levente Nuttyan, Jean-Pierre Hubaux, Self-organized public-key Management for mobile ad hoc networks, IEEE Transactions on mobile computing, Vol.2, No.1, January-March, 2003
    • (2003) IEEE Transactions on Mobile Computing , vol.2 , Issue.1
    • Capkun, S.1    Nuttyan, L.2    Hubaux, J.-P.3
  • 9
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • September 23-28, Atlanta, Georgia, USA
    • Yih-Chun Hu, Adrian Perrig, David B. Johnson. Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks, in Proceedings of the MobiCom 2002, September 23-28, 2002, Atlanta, Georgia, USA
    • (2002) Proceedings of the MobiCom 2002
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 12
    • 24744436723 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Yongguang Zhang & Wenke Lee, Intrusion Detection Techniques for Mobile Wireless Networks, Mobile Networks and Applications, 2003
    • (2003) Mobile Networks and Applications
    • Zhang, Y.1    Lee, W.2
  • 13
    • 0003336855 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • January
    • P. Ferguson, D. Senie, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing, RFC 2267, January 1998
    • (1998) RFC , vol.2267
    • Ferguson, P.1    Senie, D.2
  • 14
    • 24744471287 scopus 로고    scopus 로고
    • H-02: SUN's TCP SYN flooding solutions
    • October
    • CIAC, H-02: SUN's TCP SYN Flooding Solutions, Information Bulletin, October 1996
    • (1996) Information Bulletin
  • 15
    • 0005966913 scopus 로고    scopus 로고
    • Stateless connections
    • Proc. of 1st International Conference of Information and Communication Security (ICICS97), November 1997, Springer
    • T. Aura, P. Nikander, Stateless Connections, Proc. of 1st International Conference of Information and Communication Security (ICICS97), Lecture Notes in Computer Science 1334, November 1997, P. 87-97, Springer 1997
    • (1997) Lecture Notes in Computer Science , vol.1334 , pp. 87-97
    • Aura, T.1    Nikander, P.2
  • 16
    • 0003597247 scopus 로고    scopus 로고
    • The dynamic source routing protocol for mobile ad hoc networks (DSR)
    • draft-ietf-manet-dsr-09.txt, 15 April
    • David B. Johnson, David A. Maltz, Yih-Chun Hu, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), Internet-Draft, draft-ietf-manet- dsr-09.txt, 15 April 2003, http://www.ietf.org/internet-drafts/draft-ietf-manet- dsr-09.txt
    • (2003) Internet-draft
    • Johnson, D.B.1    Maltz, D.A.2    Hu, Y.-C.3
  • 17
    • 0742292815 scopus 로고    scopus 로고
    • Ad hoc On-Demand Distance Vector (AODV) routing
    • July
    • Charles E. Perkins, Elizabeth M. Belding-Royer, and Samir R. Das, Ad hoc On-Demand Distance Vector (AODV) Routing,RFC 3561,July 2003, http://www.ietf.org/rfc/rfc3561.txt
    • (2003) RFC , vol.3561
    • Perkins, C.E.1    Belding-Royer, E.M.2    Das, S.R.3
  • 19
    • 2442582716 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector routing
    • July
    • Manel Guerrero Zapata, Secure Ad hoc On-Demand Distance Vector Routing. ACM Mobile Computing and Communications Review (MC2R), Vol 6.No. 3, pp. 106-107, July 2002
    • (2002) ACM Mobile Computing and Communications Review (MC2R) , vol.6 , Issue.3 , pp. 106-107
    • Zapata, M.G.1
  • 21
    • 24744448547 scopus 로고    scopus 로고
    • http://www.isi.edu/nsnam/ns/index.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.