메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 1-6

DePHI: Wormhole detection mechanism for ad hoc wireless networks

Author keywords

Ad Hoc; Security; Tunnel; Wireless; Wormhole

Indexed keywords

COMPUTER VIRUSES; DELAY CIRCUITS; NETWORK PROTOCOLS; ROUTERS; SECURITY SYSTEMS; SYNCHRONIZATION; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33750397274     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (135)

References (14)
  • 1
    • 0003247337 scopus 로고    scopus 로고
    • Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations
    • January
    • S. Corson and J. Macker, "Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations," RFC2501, January 1999.
    • (1999) RFC2501
    • Corson, S.1    Macker, J.2
  • 2
    • 3042520226 scopus 로고    scopus 로고
    • Report on a working session on security in wireless ad hoc networks
    • Jan.
    • L. Buttyan and J. P. Hubaux, "Report on a Working Session on Security in Wireless Ad Hoc Networks," Mobile Computing and Communications Review," vol. 7, no. 1, Jan. 2003, pp. 74-94.
    • (2003) Mobile Computing and Communications Review , vol.7 , Issue.1 , pp. 74-94
    • Buttyan, L.1    Hubaux, J.P.2
  • 3
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May/June
    • Y. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security & Privacy, May/June 2004, pp. 28-39.
    • (2004) IEEE Security & Privacy , pp. 28-39
    • Hu, Y.1    Perrig, A.2
  • 4
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • Boston, Massachusetts, Aug. 6-11
    • Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," MobiCom'2000, Boston, Massachusetts, Aug. 6-11, 2000, pp. 275-283.
    • (2000) MobiCom'2000 , pp. 275-283
    • Zhang, Y.1    Lee, W.2
  • 5
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Boston, Massachusetts, Aug. 6-11
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," MobiCom '2000, Boston, Massachusetts, Aug. 6-11, 2000, pp. 255-265.
    • (2000) MobiCom '2000 , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 8
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • April
    • Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," Proc. of INFOCOM'2003, April 2003, pp. 1976-1986.
    • (2003) Proc. of INFOCOM'2003 , pp. 1976-1986
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 9
    • 0013138682 scopus 로고    scopus 로고
    • Secure routing for mobile ad hoc networks
    • San Antonio, TX, Jan. 27-31
    • P. Papadimitrators and Z. J. Haas, "Secure Routing for Mobile Ad Hoc Networks," Proc. of CNDS, San Antonio, TX, Jan. 27-31 2002.
    • (2002) Proc. of CNDS
    • Papadimitrators, P.1    Haas, Z.J.2
  • 12
    • 0142187757 scopus 로고    scopus 로고
    • Preventing replay attacks for secure routing in ad hoc networks
    • Montreal, Canada, Oct 8-10
    • J. Zhen and S. Srinivas, "Preventing Replay Attacks for Secure Routing in Ad Hoc Networks," ADHOC-NOW 2003, Montreal, Canada, Oct 8-10, 2003, pp. 140-150.
    • (2003) ADHOC-NOW 2003 , pp. 140-150
    • Zhen, J.1    Srinivas, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.