메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 120-130

Jamming and sensing of encrypted wireless ad hoc networks

Author keywords

Ad hoc networks; Encryption; Jamming; Sensing; Traffic analysis

Indexed keywords

COMPUTER SIMULATION; CRYPTOGRAPHY; JAMMING; NETWORK PROTOCOLS; PACKET SWITCHING; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33748061660     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1132905.1132919     Document Type: Conference Paper
Times cited : (88)

References (23)
  • 2
    • 84858943745 scopus 로고    scopus 로고
    • Uppsala University, Nov. 8
    • APE Project, How to build, install and run the APE testbed, Uppsala University, Nov. 8, 2002 http://apetestbed.sourceforge.net/ape-testbed.pdf
    • (2002) How to Build, Install and Run the APE Testbed
  • 3
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Bellardo, J., Savage, S., 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, USENIX Security Symposium, 2003.
    • (2003) USENIX Security Symposium
    • Bellardo, J.1    Savage, S.2
  • 6
    • 84858937347 scopus 로고    scopus 로고
    • Click Modular Router Project, MIT, release 1.4.3, downloaded Dec.
    • Click Modular Router Project, MIT, release 1.4.3, downloaded Dec. 2004 http://pdos.csail.mit.edu/click/
    • (2004)
  • 8
    • 0037003792 scopus 로고    scopus 로고
    • Denial of service attacks at the MAC layer in wireless ad hoc networks
    • Gupta, V., Krishnamurthy, S., Faloutsos, M. Denial of service attacks at the MAC layer in wireless ad hoc networks. In Proc. of Milcom, 2002.
    • (2002) Proc. of Milcom
    • Gupta, V.1    Krishnamurthy, S.2    Faloutsos, M.3
  • 9
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May-Jun.
    • Hu, Y.-C., Perrig, A. A survey of secure wireless ad hoc routing. IEEE Security & Privacy Magazine, v. 02, n. 3, (May-Jun. 2004), pp. 28-39.
    • (2004) IEEE Security & Privacy Magazine , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.-C.1    Perrig, A.2
  • 12
    • 84858933285 scopus 로고    scopus 로고
    • the 2.4.27 kernel, downloaded Nov.
    • Linux, The linux homepage, the 2.4.27 kernel, downloaded Nov. 2005, http://www.linux.org
    • (2005) The Linux Homepage
  • 16
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues and open problems
    • H. Federrath, ed., v. 2009 of LNCS, . Springer-Verlag
    • Raymond, J. Traffic analysis: protocols, attacks, design issues and open problems. In H. Federrath, ed., Designing Privacy Enhancing Technologies, J. 2009 of LNCS, pp. 10-29. Springer-Verlag, 2001
    • (2001) Designing Privacy Enhancing Technologies , pp. 10-29
    • Raymond, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.