메뉴 건너뛰기




Volumn 3, Issue , 2005, Pages 1737-1741

Defense against injecting traffic attacks in cooperative ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

COOPERATIVE AD HOC NETWORKS; INJECTING TRAFFIC ATTACKS; NETWORK RESOURCES;

EID: 33846606375     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2005.1577947     Document Type: Conference Paper
Times cited : (5)

References (10)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • L. Zhou and Z. Haas, Securing Ad Hoc Networks, IEEE Network Magazine, 13, no. 6, pp. Nov./Dec., 1999.
    • L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, pp. Nov./Dec., 1999.
  • 2
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
    • August
    • S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in Mobicom 2000, August 2000, pp. 255-265.
    • (2000) Mobicom 2000 , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 3
    • 0035789229 scopus 로고    scopus 로고
    • The Quest for Security in Mobile Ad Hoc Networks
    • May
    • J. P. Hubaux, L. Buttyan, and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks," in MobiHOC 2001, May 2001.
    • (2001) MobiHOC 2001
    • Hubaux, J.P.1    Buttyan, L.2    Capkun, S.3
  • 4
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
    • Atlanta, GA, USA, Sep
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," in MobiCom 2002, Atlanta, GA, USA, Sep. 2002.
    • (2002) MobiCom 2002
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 5
    • 1542317831 scopus 로고    scopus 로고
    • Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
    • San Diego, CA, USA, Sep
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," in WiSe, San Diego, CA, USA, Sep. 2003.
    • (2003) WiSe
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 6
    • 11244252132 scopus 로고    scopus 로고
    • Denial of service resilience in ad hoc networks
    • Philadelphia, PA, September
    • I. Aad, J. P. Hubaux, and E. Knightly, "Denial of service resilience in ad hoc networks," in ACM MobiCom, Philadelphia, PA, September 2004.
    • (2004) ACM MobiCom
    • Aad, I.1    Hubaux, J.P.2    Knightly, E.3
  • 8
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing
    • edited by Tomasz Imielinski and Hank Korth, chapter 5, Kluwer Academic Publishers
    • D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing," In Moible Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153-181, Kluwer Academic Publishers, 1996.
    • (1996) Moible Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 9
    • 33846638598 scopus 로고
    • Secure Hadh Standard
    • Federal Information Processing Standards Publication 180-1
    • "Secure Hadh Standard," Federal Information Processing Standards Publication 180-1, 1995.
    • (1995)
  • 10
    • 33846637173 scopus 로고    scopus 로고
    • IEEE Computer Society LAN MAN Standards Committee, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11-1007, The Institue of Electrical and Electrics Engineers.
    • IEEE Computer Society LAN MAN Standards Committee, "Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11-1007," The Institue of Electrical and Electrics Engineers.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.