메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 521-532

Securing MAODV: Attacks and countermeasures

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; AUTHENTICATION; MULTICAST ROUTING PROTOCOLS;

EID: 33845497487     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAHCN.2005.1557104     Document Type: Conference Paper
Times cited : (41)

References (37)
  • 2
    • 0003208878 scopus 로고    scopus 로고
    • Amroute: Adhoc multicast routing protocol
    • IETF, draft-talpade-manet-amroute-00.txt, August 6
    • E. Bommaiah, A. McAuley, R. Talpade, and M. Liu. Amroute: Adhoc multicast routing protocol. IETF, Internet Draft, draft-talpade-manet-amroute-00.txt, August 6, 1998.
    • (1998) Internet Draft
    • Bommaiah, E.1    McAuley, A.2    Talpade, R.3    Liu, M.4
  • 3
    • 0036929565 scopus 로고    scopus 로고
    • Secure multicast in wireless networks of mobile hosts: Protocols and issues
    • Danilo Bruschi and Emilia Rosti. Secure multicast in wireless networks of mobile hosts: protocols and issues. Mobile Networks and Applications, 7(6):503-511, 2002.
    • (2002) Mobile Networks and Applications , vol.7 , Issue.6 , pp. 503-511
    • Bruschi, D.1    Rosti, E.2
  • 6
    • 13244276488 scopus 로고    scopus 로고
    • Secure routing in mobile wireless ad hoc networks
    • S. Gupte and M. Singhal. Secure routing in mobile wireless ad hoc networks. Ad Hoc Networks, 1:151-174, 2003.
    • (2003) Ad Hoc Networks , vol.1 , pp. 151-174
    • Gupte, S.1    Singhal, M.2
  • 7
    • 11244269535 scopus 로고    scopus 로고
    • Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Yih-Chun Hu, David B. Johnson, and Adrian Perrig. Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1):175-192, 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 9
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • April
    • Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of IEEE Infocomm 2003, April 2003.
    • (2003) Proceedings of IEEE Infocomm 2003
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 11
    • 0035000419 scopus 로고    scopus 로고
    • Differential destination multicast - A manet multicast routing protocol for small groups
    • L. Ji and M. S. Corson. Differential destination multicast - a manet multicast routing protocol for small groups. In Proceedings of INFOCOM, pages 1192-02, 2001.
    • (2001) Proceedings of INFOCOM , pp. 1192-1202
    • Ji, L.1    Corson, M.S.2
  • 12
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Kluwer Academic Publishers
    • David B Johnson and David A Maltz. Dynamic source routing in ad hoc wireless networks. In Mobile Computing, volume 353. Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , vol.353
    • Johnson, D.B.1    Maltz, D.A.2
  • 19
    • 1342323825 scopus 로고    scopus 로고
    • Group communications in mobile ad hoc networks
    • Prasant Mohapatra, Chao Gui, and Jian Li. Group communications in mobile ad hoc networks. IEEE Computer, 37(2):52-59, 2004.
    • (2004) IEEE Computer , vol.37 , Issue.2 , pp. 52-59
    • Mohapatra, P.1    Chao, G.2    Jian, L.3
  • 20
    • 84903836776 scopus 로고    scopus 로고
    • How to misuse aodv: A case study of insider attacks against mobile adhoc routing protocols
    • West Point, June
    • Peng Ning and Kun Sun. How to misuse aodv: A case study of insider attacks against mobile adhoc routing protocols. In Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages 60-67, West Point, June 2003.
    • (2003) Proceedings of the 4th Annual IEEE Information Assurance Workshop , pp. 60-67
    • Peng, N.1    Kun, S.2
  • 25
    • 0012843946 scopus 로고    scopus 로고
    • Multicast ad hoc on demand distance vector (maodv) routing
    • draft-ietf-manet-maodv-00.txt, July
    • Elizabeth M. Royer and Charles E. Perkins. Multicast ad hoc on demand distance vector (maodv) routing. IETF Internet Draft, draft-ietf-manet-maodv-00. txt, July, 2000.
    • (2000) IETF Internet Draft
    • Royer, E.M.1    Perkins, C.E.2
  • 26
    • 85056059061 scopus 로고    scopus 로고
    • Multicast operation of the ad-hoc on-demand distance vector routing protocol
    • Elizabeth M. Royer and Charles E. Perkins. Multicast operation of the ad-hoc on-demand distance vector routing protocol. In Mobile Computing and Networking, pages 207-218, 1999.
    • (1999) Mobile Computing and Networking , pp. 207-218
    • Royer, E.M.1    Perkins, C.E.2
  • 31
    • 0003357528 scopus 로고    scopus 로고
    • Ad hoc multicast routing protocol utilizing increasing id-numbers (amris) functional specification
    • Nov
    • C. W. Wu, Y. C. Tay, and C. K. Toh. Ad hoc multicast routing protocol utilizing increasing id-numbers (amris) functional specification. Internet Draft. Nov, 1998.
    • (1998) Internet Draft
    • Wu, C.W.1    Tay, Y.C.2    Toh, C.K.3
  • 33
    • 0003456435 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector (saodv) routing
    • draft-guerrero-manet-saodv-00.txt, 12 August
    • Manel Guerrero Zapata. Secure ad hoc on-demand distance vector (saodv) routing. Mobile Ad Hoc Networking Working Group Internet Draft, draft-guerrero-manet-saodv-00.txt, 12 August 2001.
    • (2001) Mobile Ad Hoc Networking Working Group Internet Draft
    • Zapata, M.G.1
  • 35
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Lidong Zhou and Zygmunt J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Lidong, Z.1    Haas, Z.J.2
  • 37
    • 22944439961 scopus 로고    scopus 로고
    • Technical Report SCE-04-01, Systems and Computing Engineering, Carleton University, January
    • Y. Zhu and T. Kunz. Maodv implementation for ns-2.26. Technical Report SCE-04-01, Systems and Computing Engineering, Carleton University, January 2004.
    • (2004) Maodv Implementation for Ns-2.26
    • Zhu, Y.1    Kunz, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.