메뉴 건너뛰기




Volumn , Issue , 2005, Pages 22-32

Defend against cache consistency attacks in wireless ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; BANDWIDTH CONSUMPTION; CACHE CONSISTENCY ATTACKS; INTRUSION DETECTION;

EID: 33749527576     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBIQUITOUS.2005.23     Document Type: Conference Paper
Times cited : (5)

References (27)
  • 1
    • 0028447376 scopus 로고
    • Sleepers and workaholics: Caching strategies for mobile environments
    • D. Barbara and T. Imielinski. Sleepers and Workaholics: Caching Strategies for Mobile Environments. ACM SIGMOD, pages 1-12, 1994.
    • (1994) ACM SIGMOD , pp. 1-12
    • Barbara, D.1    Imielinski, T.2
  • 2
    • 2442597363 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol: Cooperation of nodes fairness in dynamic adhoc neTworks
    • June
    • S. Buchegger and J.-Y. Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes Fairness In Dynamic Adhoc NeTworks. ACM Mobihoc, pages 80-91, June 2002.
    • (2002) ACM Mobihoc , pp. 80-91
    • Buchegger, S.1    Boudec, J.-Y.2
  • 3
    • 0034543872 scopus 로고    scopus 로고
    • A scalable low-latency cache invalidation strategy for mobile environments
    • G. Cao. A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments. ACM Mobicom, 2000.
    • (2000) ACM Mobicom
    • Cao, G.1
  • 4
    • 0032046534 scopus 로고    scopus 로고
    • Cooperative cache-based data access in ad hoc networks
    • April
    • P. Cao and C. Liu. Cooperative Cache-Based Data Access in Ad Hoc Networks. IEEE Transactions on Computers, pages 445-457, April 1998.
    • (1998) IEEE Transactions on Computers , pp. 445-457
    • Cao, P.1    Liu, C.2
  • 5
    • 10744230968 scopus 로고    scopus 로고
    • A cooperative cache based data access framework for ad hoc networks
    • Feburary
    • G. Cao, L. Yin, and C. Das. A Cooperative Cache Based Data Access Framework For Ad Hoc Networks. IEEE Computer, pages 32-39, Feburary 2004.
    • (2004) IEEE Computer , pp. 32-39
    • Cao, G.1    Yin, L.2    Das, C.3
  • 6
    • 0033892676 scopus 로고    scopus 로고
    • Performance comparison of two on-demand routing protocols for ad hoc networks
    • S. Das, C. Perkins, and E. Royer. Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks. IEEE Infocom, pages 3-12, 2000.
    • (2000) IEEE Infocom , pp. 3-12
    • Das, S.1    Perkins, C.2    Royer, E.3
  • 8
    • 85056059061 scopus 로고    scopus 로고
    • Multicast operations of the ad-hoc on-demand distance vectore routing protocol
    • Aug.
    • E. Royer and C. Perkins. Multicast Operations of the Ad-hoc On-Demand Distance Vectore Routing Protocol. Proceedings of ACM/IEEE Mobicom'99, Aug. 1999.
    • (1999) Proceedings of ACM/IEEE Mobicom'99
    • Royer, E.1    Perkins, C.2
  • 9
    • 85177184451 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for wireless ad hoc networks
    • Sep.
    • Y. Hu, A. Perrig, and D. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Wireless Ad Hoc Networks. ACM Mobicom, Sep. 2002.
    • (2002) ACM Mobicom
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 10
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • April
    • Y. Hu, A. Perrig, and D. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. IEEE Infocom, April 2003.
    • (2003) IEEE Infocom
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 11
    • 0035789229 scopus 로고    scopus 로고
    • The quest for security in mobile ad hoc networks
    • H. Hubaux, L. Buttyan, and S. Capkun. The Quest for Security in Mobile Ad Hoc Networks. ACM MobiHoc, pages 146-155, 2001.
    • (2001) ACM MobiHoc , pp. 146-155
    • Hubaux, H.1    Buttyan, L.2    Capkun, S.3
  • 12
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • D. Johnson and D. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing, Kluwer, pages 153-181, 1996.
    • (1996) Mobile Computing, Kluwer , pp. 153-181
    • Johnson, D.1    Maltz, D.2
  • 13
    • 0036346359 scopus 로고    scopus 로고
    • Effective location-guided tree construction algorithms for small group multicast in MANET
    • June
    • K. Chen and K. Nahrstedt. Effective Location-Guided Tree Construction Algorithms for Small Group Multicast in MANET. Proceedings of IEEE Infocom'02, June 2002.
    • (2002) Proceedings of IEEE Infocom'02
    • Chen, K.1    Nahrstedt, K.2
  • 14
    • 1542298520 scopus 로고    scopus 로고
    • Detection and handling of MAC layer misbehavior in wireless networks
    • Aug.
    • P. Kyasanur and N. Vaidya. Detection and Handling of MAC Layer Misbehavior in Wireless Networks. Technical Report, UIUC, Aug. 2002.
    • (2002) Technical Report, UIUC
    • Kyasanur, P.1    Vaidya, N.2
  • 15
    • 0036924499 scopus 로고    scopus 로고
    • On-demand multicast routing protocol in multihop wireless mobile networks
    • December
    • S. Lee, W. Su, and M. Gerla. On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks. ACM/Kluwer Mobile Networks and Applications (MONET), 7(6):441-453, December 2002.
    • (2002) ACM/Kluwer Mobile Networks and Applications (MONET) , vol.7 , Issue.6 , pp. 441-453
    • Lee, S.1    Su, W.2    Gerla, M.3
  • 17
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Aug.
    • S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. ACM MobiCom, Aug. 2000.
    • (2000) ACM MobiCom
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 22
    • 20344365025 scopus 로고    scopus 로고
    • Prioritized overlay multicast in mobile ad hoc environments
    • Feb.
    • L. Xiao, L. Ni, and A. Esfahanian. Prioritized Overlay Multicast in Mobile Ad Hoc Environments. IEEE Computer, Feb. 2004.
    • (2004) IEEE Computer
    • Xiao, L.1    Ni, L.2    Esfahanian, A.3
  • 23
    • 8344245288 scopus 로고    scopus 로고
    • On supporting cooperative cache in ad hoc networks
    • L. Yin and G. Cao. On Supporting Cooperative Cache in Ad Hoc networks. IEEE INFOCOM'04, 2004.
    • (2004) IEEE INFOCOM'04
    • Yin, L.1    Cao, G.2
  • 24
    • 25844473466 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration based approach
    • W. Zhang and G. Cao. Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration Based Approach. IEEE INFOCOM'05, 2005.
    • (2005) IEEE INFOCOM'05
    • Zhang, W.1    Cao, G.2
  • 25
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless adHoc networks
    • Aug.
    • Y. Zhang and W. Lee. Intrusion Detection in Wireless AdHoc Networks. ACM Mobicom, pages 275-283, Aug. 2000.
    • (2000) ACM Mobicom , pp. 275-283
    • Zhang, Y.1    Lee, W.2
  • 26
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • November/December
    • L. Zhou and Z. Haas. Securing Ad Hoc Networks. IEEE Network, 13(6):24-30, November/December 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 27
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning. An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks. IEEE Symposium on Security and Privacy, 2004.
    • (2004) IEEE Symposium on Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.