메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 15-23

Transient MAC address scheme for untraceability and DoS attack resiliency on wireless network

Author keywords

[No Author keywords available]

Indexed keywords

DENIAL OF SERVICE (DOS) ATTACK; MEDIA ACCESS CONTROL (MAC); MOBILE DEVICES; SECURITY THREATS;

EID: 33748897336     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WTS.2005.1524759     Document Type: Conference Paper
Times cited : (8)

References (13)
  • 2
    • 0003544551 scopus 로고    scopus 로고
    • IEEE standard for local and metropolitan area networks - Port-based network access control
    • LAN MAN Standards Committee of the IEEE Computer Society, "IEEE Standard for Local and Metropolitan Area Networks - Port-Based Network Access Control," IEEE Standard 802. 1X, 2001.
    • (2001) IEEE Standard , vol.802
  • 3
    • 33748884051 scopus 로고    scopus 로고
    • IEEE 802.11 wireless LAN Medium Access Control (MAC) and physical layer (PHY) specifications -Amendment 6: Medium Access Control (MAC) security enhancements
    • LAN MAN Standards Committee of the IEEE Computer Society, "IEEE 802.11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications -Amendment 6: Medium Access Control (MAC) Security Enhancements," IEEE Standard 802. 11i, 2004.
    • (2004) IEEE Standard , vol.802
  • 4
    • 7244249662 scopus 로고    scopus 로고
    • 3GPP TS 33.900, V1.2.0
    • 3rd Generation Partnership Project, "A Guide to 3rd Generation Security," 3GPP TS 33.900, V1.2.0, 2000.
    • (2000) A Guide to 3rd Generation Security
  • 7
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilitics and practical solutions
    • John Bellardo and Stefan Savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilitics and Practical Solutions," Proc. 12th USENIX Security Symposium, pp. 15-28, 2003.
    • (2003) Proc. 12th USENIX Security Symposium , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 9
    • 0013046241 scopus 로고    scopus 로고
    • An initial security analysis of the IEEE 802. 1X standard
    • Department of Computer Science, University of Maryland
    • Arunesh Mishra and William A. Arbaugh, "An Initial Security Analysis of the IEEE 802. 1X Standard," Technical Report UMIACS-TR-2002-10, Department of Computer Science, University of Maryland, 2002.
    • (2002) Technical Report , vol.UMIACS-TR-2002-10
    • Mishra, A.1    Arbaugh, W.A.2
  • 12
    • 84859275570 scopus 로고    scopus 로고
    • MIRAI-SF. http://mirai-sf.nict.go.jp/.
  • 13
    • 0842267408 scopus 로고    scopus 로고
    • The overview of the new generation mobile communication system and the role of software defined radio technology
    • Hiroshi Harada, Masahiro Kuroda, Hiroyuki Morikawa, Hiromitsu Wakana and Fumiyuki Adachi, 'The Overview of the New Generation Mobile Communication System and the Role of Software Defined Radio Technology," IEICE Trans. on Communications, Vol.E86-B, No. 12, pp. 3374-3384, 2003.
    • (2003) IEICE Trans. on Communications , vol.E86-B , Issue.12 , pp. 3374-3384
    • Harada, H.1    Kuroda, M.2    Morikawa, H.3    Wakana, H.4    Adachi, F.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.