메뉴 건너뛰기




Volumn 4219 LNCS, Issue , 2006, Pages 249-271

DEMEM: Distributed Evidence-driven Message Exchange intrusion detection Model for MANET

Author keywords

AODV; Attack method; Constraint; DEMEM; DSR; Evidence; Forwarder; Hello message; ID manager; ID message; ID evidence; ID forward; ID request; IDS; MANET; MPR; MPR selector; OLSR; TBRPF; TC message; TESLA

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; MATHEMATICAL MODELS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; ROUTERS; TELECOMMUNICATION NETWORKS;

EID: 33750370441     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11856214_13     Document Type: Conference Paper
Times cited : (32)

References (25)
  • 4
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • March
    • K. Ilgun, R. Kemmerer, and P. Porras, "State Transition Analysis: A Rule-based Intrusion Detection Approach", IEEE Transactions of Software Engineering, 2(13):181-199, March 1995.
    • (1995) IEEE Transactions of Software Engineering , vol.2 , Issue.13 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.2    Porras, P.3
  • 5
  • 16
    • 2442551009 scopus 로고    scopus 로고
    • Optimized link state routing protocol
    • T. Clausen and P. Jacquet, "Optimized Link State Routing Protocol.", IETF RFC 3626
    • IETF RFC , vol.3626
    • Clausen, T.1    Jacquet, P.2
  • 17
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • David Johnson, David Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks", Mobile Computing, 1996
    • (1996) Mobile Computing
    • Johnson, D.1    Maltz, D.2
  • 18
    • 84870706779 scopus 로고    scopus 로고
    • Ad Hoc on Demand Distance Vector (AODV) routing
    • Charles E. Perkins, Elizabeth M. Belding-Royer, and Samir Das. "Ad Hoc On Demand Distance Vector (AODV) Routing." IETF RFC 3561
    • IETF RFC , vol.3561
    • Perkins, C.E.1    Belding-Royer, E.M.2    Das, S.3
  • 21
    • 10444224907 scopus 로고    scopus 로고
    • Attack analysis and detection for ad hoc routing protocols
    • Yi-an Huang, Wenke Lee, "Attack Analysis and Detection for Ad Hoc Routing Protocols", RAID 2004
    • RAID 2004
    • Huang, Y.-A.1    Lee, W.2
  • 22
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA broadcast authentication protocol
    • RSA Laboratories, Summer/Fall 2002
    • Perrig, R. Canetti, D. Tygar and D. Song, "The TESLA broadcast authentication protocol," In Cryptobytes (RSA Laboratories, Summer/Fall 2002), 5(2):2-13, 2002.
    • (2002) Cryptobytes , vol.5 , Issue.2 , pp. 2-13
    • Perrig1    Canetti, R.2    Tygar, D.3    Song, D.4
  • 24
    • 24944479711 scopus 로고    scopus 로고
    • Topology broadcast based on reverse-path forwarding
    • R. Ogier, F. Templin, M. Lewis, "Topology Broadcast based on Reverse-Path Forwarding", IETF RFC 3684
    • IETF RFC , vol.3684
    • Ogier, R.1    Templin, F.2    Lewis, M.3
  • 25
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Y.C. Hu, A. Perrig, D.B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks", Proceedings of INFOCOM, 2003
    • (2003) Proceedings of INFOCOM
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.