메뉴 건너뛰기




Volumn 2, Issue , 2005, Pages 1252-1261

HADOF: Defense against routing disruptions in mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

PACKET FORWARDING; ROUTE TRAFFIC;

EID: 25844465866     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (43)

References (29)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov./Dec.
    • L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, pp. Nov./Dec., 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.2
  • 2
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • Boston, MA, USA, August
    • Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," in MobiCom, Boston, MA, USA, August 2000.
    • (2000) MobiCom
    • Zhang, Y.1    Lee, W.2
  • 3
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Boston, MA, USA, August
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in MobiCom, Boston, MA, USA, August 2000.
    • (2000) MobiCom
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 4
    • 0035789229 scopus 로고    scopus 로고
    • The quest for security in mobile ad hoc networks
    • May
    • J. P. Hubaux, L. Buttyan, and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks," in MobiHOC, May 2001.
    • (2001) MobiHOC
    • Hubaux, J.P.1    Buttyan, L.2    Capkun, S.3
  • 5
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Atlanta, GA, USA, Sep.
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," in MobiCom, Atlanta, GA, USA, Sep. 2002.
    • (2002) MobiCom
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 6
    • 1542317831 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • San Diego, CA, USA, Sep.
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," in WiSe, San Diego, CA, USA, Sep. 2003.
    • (2003) WiSe
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 8
    • 0003843664 scopus 로고    scopus 로고
    • Ad Hoc on Demand Distance Vector (AODV) routing
    • draft-ietf-manet-olsr-10.txt, Jan.
    • C. E. Perkins, E. M. Belding-Royer, and S. R. Das, "Ad Hoc On Demand Distance Vector (AODV) Routing," Internet-Draft, draft-ietf-manet-olsr-10. txt, Jan. 2002.
    • (2002) Internet-draft
    • Perkins, C.E.1    Belding-Royer, E.M.2    Das, S.R.3
  • 9
    • 1542356506 scopus 로고    scopus 로고
    • The Dynamic Source Routing protocol for mobile ad hoc networks (DSR)
    • draft-ietf-manet-dsr-07.txt, Feb.
    • D. B. Johnson, D. A. Maltz, Y. C. Hu, and J. G. Jetcheva, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)," Internet-Draft, draft-ietf-manet-dsr-07.txt, Feb. 2002.
    • (2002) Internet-draft
    • Johnson, D.B.1    Maltz, D.A.2    Hu, Y.C.3    Jetcheva, J.G.4
  • 10
    • 7244251119 scopus 로고    scopus 로고
    • Topology Broadcast Based on Reverse-Path Forwarding (TBRPF)
    • draft-ietf-manet-tbrpf-05.txt, Mar. Work in progress
    • R. G. Ogier, F. L. Templin, B. Bellur, and M. G. Lewis, "Topology Broadcast Based on Reverse-Path Forwarding (TBRPF)," Internet-Draft, draft-ietf-manet-tbrpf-05.txt, Mar. 2002. Work in progress.
    • (2002) Internet-draft
    • Ogier, R.G.1    Templin, F.L.2    Bellur, B.3    Lewis, M.G.4
  • 13
    • 0036980294 scopus 로고    scopus 로고
    • Securing ad hoc routing protocols
    • Sep.
    • M. G. Zapata and N. Asokan, "Securing Ad Hoc Routing Protocols," in WiSe, Sep. 2002.
    • (2002) WiSe
    • Zapata, M.G.1    Asokan, N.2
  • 14
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," in IEEE INFOCOM, 2003.
    • (2003) IEEE INFOCOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 15
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Y.-C. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Ad Hoc Networks Journal, vol. 1, pp. 175-192, 2003.
    • (2003) Ad Hoc Networks Journal , vol.1 , pp. 175-192
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 16
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol
    • S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol," in Mobihoc, 2002, pp. 226-236.
    • (2002) Mobihoc , pp. 226-236
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 17
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • Oct.
    • L. B. and J.-P. Hubaux, "Stimulating Cooperation in Self-organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579 - 592, Oct. 2003.
    • (2003) Mobile Networks and Applications , vol.8 , Issue.5 , pp. 579-592
    • B., L.1    Hubaux, J.-P.2
  • 18
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks," in IEEE INFOCOM, 2003.
    • (2003) IEEE INFOCOM
    • Zhong, S.1    Chen, J.2    Yang, Y.R.3
  • 20
    • 1542317847 scopus 로고    scopus 로고
    • BISS: Building secure routing out of an incomplete set of security associations
    • San Diego, CA, USA, Sep.
    • S. Capkun and J.-P. Hubaux, "BISS: Building Secure Routing out of an Incomplete Set of Security Associations," in WiSe, San Diego, CA, USA, Sep. 2003.
    • (2003) WiSe
    • Capkun, S.1    Hubaux, J.-P.2
  • 22
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks, mobile computing
    • edited by Tomasz Imielinski and Hank Korth, chapter 5, Kluwer Academic Publishers
    • D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing," In Moible Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153-181, Kluwer Academic Publishers, 1996.
    • (1996) Moible Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 25
    • 1642324009 scopus 로고    scopus 로고
    • Statiscially Unique and Cryptographically Verifiable (SUCV) identifiers and addresses
    • G. Montenegro and C. Castelluccis, "Statiscially Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses," in Proceedings of NDSS, 2002.
    • (2002) Proceedings of NDSS
    • Montenegro, G.1    Castelluccis, C.2
  • 28
    • 0347458171 scopus 로고    scopus 로고
    • Path set selection in mobile ad hoc networks
    • EPFL Lausanne, Switzerland, June
    • P. Papadimitratos, Z. J. Haas, and E. G. Sirer, "Path Set Selection in Mobile Ad Hoc Networks," in MobiHOC, EPFL Lausanne, Switzerland, June 2002.
    • (2002) MobiHOC
    • Papadimitratos, P.1    Haas, Z.J.2    Sirer, E.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.