메뉴 건너뛰기




Volumn 2, Issue , 2003, Pages 735-740

Secure routing in ad hoc networks and a related intrusion detection problem

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; INTRUSION DETECTION MECHANISM; REDUNDANT INFORMATION; WIRELESS NETWORK;

EID: 3142747076     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (29)

References (26)
  • 5
    • 85177184451 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for wireless ad hoc networks
    • Sep.
    • Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Wireless Ad Hoc Networks," ACM Mobicom, Sep. 2002.
    • (2002) ACM Mobicom
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 6
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • April
    • Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," IEEE Infocom, April 2003.
    • (2003) IEEE Infocom
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 7
    • 0035789229 scopus 로고    scopus 로고
    • The quest for security in mobile ad hoc networks
    • H. Hubaux, L. Buttyan, and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks," ACM MobiHoc, pp. 146-155, 2001.
    • (2001) ACM MobiHoc , pp. 146-155
    • Hubaux, H.1    Buttyan, L.2    Capkun, S.3
  • 9
    • 0028738680 scopus 로고
    • Sensitivity analysis for discrete-time randomized service priority queues
    • G. Kesidis, P. Konstantopoulos, and M. Zazanis, "Sensitivity Analysis for Discrete-time Randomized Service Priority Queues," IEEE CDC Proc., 1994.
    • (1994) IEEE CDC Proc.
    • Kesidis, G.1    Konstantopoulos, P.2    Zazanis, M.3
  • 11
    • 1542298520 scopus 로고    scopus 로고
    • Detection and handling of mac layer misbehavior in wireless networks
    • Aug.
    • P. Kyasanur and N. Vaidya, "Detection and Handling of MAC Layer Misbehavior in Wireless Networks," Technical Report, UIUC, Aug. 2002.
    • (2002) Technical Report, UIUC
    • Kyasanur, P.1    Vaidya, N.2
  • 12
    • 0000328529 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Aug
    • S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," ACM MobiCom, Aug.
    • ACM MobiCom
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 14
    • 0028430224 scopus 로고
    • Network intrusion detection
    • May/June
    • B. Mukherjee, L. Heberlein, and K. Levitt, "Network Intrusion Detection," IEEE Network, vol. 8, no. 3, pp. 26-41, May/June 1994.
    • (1994) IEEE Network , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, L.2    Levitt, K.3
  • 17
    • 3142672450 scopus 로고    scopus 로고
    • Intrusion detection based on packet dropping patterns in multi-hop wireless networks
    • to appear in, San Francisco, Dec.
    • R. Rao and G. Kesidis, "Intrusion Detection Based on Packet Dropping Patterns in Multi-hop Wireless Networks," to appear in IEEE Globecom, San Francisco, Dec. 2002.
    • (2002) IEEE Globecom
    • Rao, R.1    Kesidis, G.2
  • 19
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 20
    • 0007473204 scopus 로고    scopus 로고
    • An introduction to intrusion detection
    • Apr.
    • A. Sundaram, "An Introduction to Intrusion Detection," ACM Crossroads Issue 2.4, Apr. 1996.
    • (1996) ACM Crossroads Issue 2.4
    • Sundaram, A.1
  • 21
    • 0026154828 scopus 로고
    • SPX: Global authentication using public key certificates
    • May
    • J. Tardo and K. Algappan, "SPX: Global Authentication Using Public Key Certificates," IEEE Symposium on Security and Privacy, pp. 232-244, May 1991.
    • (1991) IEEE Symposium on Security and Privacy , pp. 232-244
    • Tardo, J.1    Algappan, K.2
  • 23
    • 0036980295 scopus 로고    scopus 로고
    • Self-organized network-layer security in mobile ad hoc networks
    • Aug.
    • H. Yang, X. Meng, and S. Lu, "Self-Organized Network-Layer Security in Mobile Ad Hoc Networks," ACM Workshop on Wireless Security, Aug. 2002.
    • (2002) ACM Workshop on Wireless Security
    • Yang, H.1    Meng, X.2    Lu, S.3
  • 24
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • Aug.
    • Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," ACM Mobicom, pp. 275-283, Aug. 2000.
    • (2000) ACM Mobicom , pp. 275-283
    • Zhang, Y.1    Lee, W.2
  • 25
    • 0842266215 scopus 로고    scopus 로고
    • Malicious packet dropping: How it might impact the TCP performance and how we can detect it
    • X. Zhang, S. Wu, Z. Fu, and T. Wu, "Malicious Packet Dropping: How it Might Impact the TCP Performance and How We Can Detect It," IEEE ICNP, 2000.
    • (2000) IEEE ICNP
    • Zhang, X.1    Wu, S.2    Fu, Z.3    Wu, T.4
  • 26
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • November/December
    • L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network, vol. 13, no. 6, pp. 24-30, November/December 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.