메뉴 건너뛰기




Volumn , Issue , 2005, Pages 160-167

On the resiliency of mobile ad hoc networks to MAC layer misbehavior

Author keywords

Ad hoc networks; Routing

Indexed keywords

COMPUTER SIMULATION; LOCAL AREA NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; RADAR;

EID: 31844455819     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1089803.1089981     Document Type: Conference Paper
Times cited : (16)

References (17)
  • 3
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • J. Bellardo and S. Savage. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX, 2003.
    • (2003) USENIX
    • Bellardo, J.1    Savage, S.2
  • 4
    • 84858886969 scopus 로고    scopus 로고
    • Detection and prevention of mac layer misbehavior for ad hoc networks
    • October
    • A. Cardenas, S. Radosavac, and J. S. Baras. Detection and prevention of mac layer misbehavior for ad hoc networks. In (SASN), October 2004.
    • (2004) (SASN)
    • Cardenas, A.1    Radosavac, S.2    Baras, J.S.3
  • 6
    • 31844449737 scopus 로고    scopus 로고
    • Vulnerabilities of ad hoc network routing protocols to mac misbehavior
    • August
    • L. Guang and C. Assi. Vulnerabilities of ad hoc network routing protocols to mac misbehavior, In IEEE/ACM WIMOB, August 2005.
    • (2005) IEEE/ACM WIMOB
    • Guang, L.1    Assi, C.2
  • 8
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for adhoc networks
    • September
    • Y.-C. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for adhoc networks, In Proceedings of the MobiCom, September 2002.
    • (2002) Proceedings of the MobiCom
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.3
  • 10
    • 0012296272 scopus 로고    scopus 로고
    • The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks
    • D. Maltz, J. Broch, J. Jetcheva, and D. Johnson. The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks, In IEEE JSAC, 1999.
    • (1999) IEEE JSAC
    • Maltz, D.1    Broch, J.2    Jetcheva, J.3    Johnson, D.4
  • 14
    • 31844449871 scopus 로고    scopus 로고
    • Domino: A system to detect greedy behavior in ieee 802.11 hotspots
    • June
    • M. Raya, J. P. Hubaux, and I. Aad. Domino: A system to detect greedy behavior in ieee 802.11 hotspots. In Proceedings of ACM MobiSys, June 2004.
    • (2004) Proceedings of ACM MobiSys
    • Raya, M.1    Hubaux, J.P.2    Aad, I.3
  • 15
    • 0016643763 scopus 로고
    • Packet switching in radio channels: The hidden terminal problem in carrier sense multiple access models and the busy tone solution
    • December
    • F. A. Tobagi and L. Kleinrock. Packet switching in radio channels: The hidden terminal problem in carrier sense multiple access models and the busy tone solution. IEEE Transactions on Communications, December 1975.
    • (1975) IEEE Transactions on Communications
    • Tobagi, F.A.1    Kleinrock, L.2
  • 16
    • 0029694417 scopus 로고    scopus 로고
    • Analyzing and improving the ieee 802.11-mac protocol for wireless lans
    • Feb
    • J. Weinmiller, H. Woesner, and A. Wolisz, Analyzing and improving the ieee 802.11-mac protocol for wireless lans, In MASCOTS, Feb 1996.
    • (1996) MASCOTS
    • Weinmiller, J.1    Woesner, H.2    Wolisz, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.