메뉴 건너뛰기




Volumn 3, Issue , 2005, Pages 336-343

Routeguard: An intrusion detection and response system for mobile ad hoc networks

Author keywords

Ad hoc networks; Intrusion detection; Malicious nodes; Network security

Indexed keywords

AD HOC NETWORKS; INTRUSION DETECTION; MALICIOUS NODES; NETWORK SECURITY;

EID: 33747289360     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIMOB.2005.1512922     Document Type: Conference Paper
Times cited : (32)

References (20)
  • 1
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Feb.
    • Mishra, A., Nadkami, K, and Patcha, A., "Intrusion Detection in Wireless Ad hoc Networks," IEEE Wireless Communications, Vol. 11, Feb. 2004, pp. 48-60
    • (2004) IEEE Wireless Communications , vol.11 , pp. 48-60
    • Mishra, A.1    Nadkami, K.2    Patcha, A.3
  • 7
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The dynamic source routing protocol for multihop wireless ad hoc networks
    • edited by Charles E. Perkins, Addison-Wesley
    • D. B. Johnson, D. A. Maltz, and J. Broch, "DSR: The dynamic source routing protocol for multihop wireless ad hoc networks," Ad Hoc Networking, edited by Charles E. Perkins, Addison-Wesley, 2001, pp. 139-172.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2    Broch, J.3
  • 11
    • 0037022137 scopus 로고    scopus 로고
    • A new wireless ad hoc multicast routing protocol
    • Elsevier Science, Feb
    • S. Lee, and C. Kim, "A New Wireless Ad hoc Multicast Routing Protocol," Computer Networks, vol. 38, no. 2, Elsevier Science, Feb 2002, pp. 121-135.
    • (2002) Computer Networks , vol.38 , Issue.2 , pp. 121-135
    • Lee, S.1    Kim, C.2
  • 13
    • 85056059061 scopus 로고    scopus 로고
    • Multicast operation of the ad hoc on-demand distance vector routing protocol
    • Aug
    • E. M. Royer, and C. E. Perkins, "Multicast operation of the ad hoc on-demand distance vector routing protocol," Proceedings of MOBICOM 1999, Aug 1999, pp. 207-218
    • (1999) Proceedings of MOBICOM 1999 , pp. 207-218
    • Royer, E.M.1    Perkins, C.E.2
  • 14
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The dynamic source routing protocol for multihop wireless ad hoc networks
    • edited by Charles E. Perkins, Addison-Wesley
    • D. B. Johnson, D. A. Maltz, and J. Broch, "DSR: The dynamic source routing protocol for multihop wireless ad hoc networks," Ad Hoc Networking, edited by Charles E. Perkins, Addison-Wesley, 2001, pp. 139-172.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2    Broch, J.3
  • 16
    • 33747323346 scopus 로고    scopus 로고
    • Making greed work in mobile ad hoc networks
    • March
    • Peitro Michiardi Rdfik Molva, "Making greed work in mobile ad hoc networks," Research Report RP-02-069, March 2002.
    • (2002) Research Report , vol.RP-02-069
    • Molva, P.M.R.1
  • 18
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • D.B.J. Yih-Chun Hu, Adrian Perrig. "Packet leashes: A defense against wormhole attacks in wireless networks,"INFOCOM 2003, 2003
    • (2003) INFOCOM 2003
    • Yih-Chun Hu, D.B.J.1    Perrig, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.