메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 402-409

MAC layer anomaly detection in ad hoc networks

Author keywords

Ad hoc network; Anomaly detection; Cross feature analysis; MAC layer anomaly

Indexed keywords

AD HOC NETWORKS; ANOMALY DETECTION; CROSS-FEATURE ANALYSIS; MAC LAYER ANOMALIES;

EID: 33745457611     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAW.2005.1495980     Document Type: Conference Paper
Times cited : (33)

References (21)
  • 2
    • 0004118143 scopus 로고    scopus 로고
    • A secure routing protocol for ad hoc networks
    • Department of Computer Science, University of Massachusetts, August
    • B. Dahill, B. N. Levine, E. Royer, and C. Shields, "A Secure Routing Protocol for Ad Hoc Networks," Technical Report 01-37, Department of Computer Science, University of Massachusetts, August 2001.
    • (2001) Technical Report 01-37
    • Dahill, B.1    Levine, B.N.2    Royer, E.3    Shields, C.4
  • 4
    • 1542317831 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • September
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," in emphACM Workshop on Wireless Security 2003, pp. 30-40, September 2003.
    • (2003) emphACM Workshop on Wireless Security 2003 , pp. 30-40
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 5
    • 0035271246 scopus 로고    scopus 로고
    • Authenticated ad hoc routing at the link layer for mobile systems
    • Kluwer Academic Publishers
    • J. Brinkley, and W. Trost, "Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems," Wireless Networks 7, pp. 139-145, Kluwer Academic Publishers, 2001.
    • (2001) Wireless Networks , vol.7 , pp. 139-145
    • Brinkley, J.1    Trost, W.2
  • 17
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhold attacks in wireless ad hoc networks
    • April
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense Against Wormhold Attacks in Wireless Ad Hoc Networks," in Proceedings of IEEE INFOCOM 2003, vol. 3, pp. 1976-1986, April 2003.
    • (2003) Proceedings of IEEE INFOCOM 2003 , vol.3 , pp. 1976-1986
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 18
    • 27544460639 scopus 로고    scopus 로고
    • Mitigating byzantine attacks in ad hoc wireless networks
    • Center for Networking and Distributed Systems, Computer Science Department, Johns Hopkins University, March
    • B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "Mitigating Byzantine Attacks in Ad Hoc Wireless Networks," Technical Report 1, Center for Networking and Distributed Systems, Computer Science Department, Johns Hopkins University, March 2004
    • (2004) Technical Report , vol.1
    • Awerbuch, B.1    Curtmola, R.2    Holmer, D.3    Nita-Rotaru, C.4    Rubens, H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.