메뉴 건너뛰기




Volumn 5, Issue 3, 2007, Pages 289-298

Detecting unauthorized and compromised nodes in mobile ad hoc networks

Author keywords

Authentication; Compromised nodes; Intrusion detection; Mobile ad hoc networks

Indexed keywords

KNOWLEDGE ENGINEERING; PROBLEM SOLVING; SECURITY OF DATA; TELECOMMUNICATION LINKS;

EID: 33845889547     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2005.11.005     Document Type: Article
Times cited : (59)

References (30)
  • 3
    • 0035728669 scopus 로고    scopus 로고
    • B. DeCleene et al., Secure group communications for wireless networks, in: IEEE Military Communications Conference (MILCOM), Virginia, USA, October 2001.
  • 5
    • 0742294233 scopus 로고    scopus 로고
    • Mobile ad hoc networking: imperatives and challenges
    • Chlamtac C.M., and Liu J.J.-N. Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks 1 July (2003) 13-64
    • (2003) Ad Hoc Networks , vol.1 , Issue.July , pp. 13-64
    • Chlamtac, C.M.1    Liu, J.J.-N.2
  • 6
    • 33845866514 scopus 로고    scopus 로고
    • C. Perkins, Ad hoc on-demand distance-vector routing (AODV), IETF draft, 2001.
  • 7
    • 4544267132 scopus 로고    scopus 로고
    • D. Watkins, C. Scott, Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks, in: IEEE Wireless Communications and Networking Conference (WCNC), vol. 1, 21-25 March 2004, pp. 622-627.
  • 8
    • 11244256574 scopus 로고    scopus 로고
    • E.C.H. Ngai, M.R. Lyu, R.T. Chin, An authentication service against dishonest users in mobile ad hoc networks, in: IEEE Proceedings on Aerospace Conference, vol. 2, March 2004, pp. 1275-1285.
  • 9
    • 3042598885 scopus 로고    scopus 로고
    • E.C.H. Ngai, M.R. Lyu, Trust- and clustering-based authentication services in mobile ad hoc networks, in: 24th International Conference on Distributed Computing Systems Workshops, June 2004, pp. 582-587.
  • 10
    • 1842815887 scopus 로고    scopus 로고
    • Security in Mobile Ad Hoc networks: challenges and solutions
    • Yang H., Luo H.Y., Ye F., Lu S.W., and Zhang L. Security in Mobile Ad Hoc networks: challenges and solutions. IEEE Wireless Communications 11 February (2004) 38-47
    • (2004) IEEE Wireless Communications , vol.11 , Issue.February , pp. 38-47
    • Yang, H.1    Luo, H.Y.2    Ye, F.3    Lu, S.W.4    Zhang, L.5
  • 11
    • 0035789229 scopus 로고    scopus 로고
    • J. Hubaux, L. Buttyán, S. Capkun, The quest for security in mobile ad hoc networks, in: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, Long Beach, CA, USA, October 2001.
  • 12
    • 33845884225 scopus 로고    scopus 로고
    • J. Kong et al., Adaptive security for multi-layer ad-hoc networks, Special Issue of Wireless Communications and Mobile Computing, John Wiley InterScience Press, 2002.
  • 13
    • 33845902957 scopus 로고    scopus 로고
    • J. Kong et al., Providing robust and ubiquitous security support for mobile ad hoc networks, in: IEEE ICNP, Riverside, USA, 2001.
  • 14
    • 0035365149 scopus 로고    scopus 로고
    • Self-organization in mobile ad-hoc networks: the approach of terminodes
    • Blazevic L., et al. Self-organization in mobile ad-hoc networks: the approach of terminodes. IEEE Communications Magazine June (2001) 166-173
    • (2001) IEEE Communications Magazine , Issue.June , pp. 166-173
    • Blazevic, L.1
  • 15
    • 84954161437 scopus 로고    scopus 로고
    • L. Buttyán, J. Hubaux, Enforcing service availability in mobile ad-hoc WANs, in: Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking and Computing, Boston, MA, August 2000.
  • 16
    • 0034590150 scopus 로고    scopus 로고
    • L. Venkatraman, D.P. Agrawal, A novel authentication scheme for ad hoc networks, in: 2nd IEEE Wireless Communications and Networking Conference, Chicago, 2000.
  • 18
    • 33845875349 scopus 로고    scopus 로고
    • N. Komninos, Security architecture for future communication systems, PhD thesis, Lancaster University, 2003.
  • 19
    • 1542360013 scopus 로고    scopus 로고
    • P. Kyasanur, N. Vaidya, Detection and handling of MAC layer misbehavior in wireless networks, in: International Conference on Dependable Systems and Networks (DSN'03), San Francisco, CA, June 2003, pp. 173-182.
  • 20
    • 0242527360 scopus 로고    scopus 로고
    • P. Papadimitratos, Z.J. Haas, E.G. Sirer, Path set selection in mobile ad hoc networks, in: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, Switzerland, 2002, pp. 1-11.
  • 21
    • 0141763764 scopus 로고    scopus 로고
    • Q. Xue, J. Sun, Z. Wei, TJIDS: an intrusion detection architecture for distributed network, in: IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), vol. 2, 4-7 May 2003, pp. 709-712.
  • 22
    • 18144421528 scopus 로고    scopus 로고
    • S. Bo, W. Kui, U.W. Pooch, Towards adaptive intrusion detection in mobile ad hoc networks, in: IEEE Global Telecommunications Conference (GLOBECOM), vol. 6, 29 November-3 December 2004, pp. 3551-3555.
  • 23
    • 20344362166 scopus 로고    scopus 로고
    • X. Gang, L. Iftode, Locality driven key management architecture for mobile ad-hoc networks, in: IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 25-27 October 2004, pp. 436-446.
  • 24
    • 6344287668 scopus 로고    scopus 로고
    • X. Yan, L. Ren-Fa, L. Ken-Li, Intrusion detection using mobile agent in ad-hoc networks, in: Proceedings of International Conference on Machine Learning and Cybernetics, vol. 6, 26-29 August 2004, pp. 3383-3388.
  • 25
    • 2942644292 scopus 로고    scopus 로고
    • Y. Chou-Chen, C. Chia-Meng, C. Ting-Yi, A routing authentication mechanism for wireless ad hoc networks, in: IEEE International Conference on Networking, Sensing and Control, vol. 1, 21-23 March 2004, pp. 456-461.
  • 26
    • 85177190420 scopus 로고    scopus 로고
    • Y. Hu, A. Perrig, D. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, ACM MOBICOM, September 2002, Georgia, USA.
  • 27
    • 1842693650 scopus 로고    scopus 로고
    • Packet leashes: a defense against wormhole attacks in wireless networks
    • Hu Y., Perrig A., and Johnson D. Packet leashes: a defense against wormhole attacks in wireless networks. IEEE INFOCOM (2002)
    • (2002) IEEE INFOCOM
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 28
    • 17144397587 scopus 로고    scopus 로고
    • Y.-R. Tsai, S.-J. Wang, Routing security and authentication mechanism for mobile ad hoc networks, in: IEEE 60th Vehicular Technology Conference (VTC2004), vol. 7, 26-29 September 2004, pp. 4716-4720.
  • 29
    • 85177498539 scopus 로고    scopus 로고
    • Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, USA, 2000, pp. 275-283.
  • 30
    • 3142747076 scopus 로고    scopus 로고
    • W. Zhang, R. Rao, G. Cao, G. Kesidis, Secure routing in ad hoc networks and a related intrusion detection problem, in: IEEE Military Communications Conference (MILCOM), vol. 2, 13-16 October 2003, pp. 735- 740.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.