메뉴 건너뛰기




Volumn 5, Issue 1, 2007, Pages 23-29

Dependability in wireless networks: Can we rely on WiFi?

Author keywords

[No Author keywords available]

Indexed keywords

DIRECT SEQUENCE SPREAD SPECTRUM (DSSS); NETWORK INTRUSION DETECTION; RADIO CHANNELS; WIRELESS LINK;

EID: 33847720731     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2007.4     Document Type: Article
Times cited : (43)

References (16)
  • 2
    • 3042737904 scopus 로고    scopus 로고
    • Wireless Security Future
    • B. Potter, "Wireless Security Future," IEEE Security & Privacy, vol. 1, no. 4, 2003, pp. 68-72.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.4 , pp. 68-72
    • Potter, B.1
  • 3
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
    • Usenix Assoc
    • J. Bellardo and S. Savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," Proc. 11th Usenix Security Symp., Usenix Assoc., 2003, pp. 15-28.
    • (2003) Proc. 11th Usenix Security Symp , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 4
    • 33847748750 scopus 로고    scopus 로고
    • S. Capkun andJ.P. Hubaux, Securing Position and Distance Verification in Wireless Networks, tech. report EPFL/IC/200443, Swiss Federal Inst. of Tech., May 2004.
    • S. Capkun andJ.P. Hubaux, Securing Position and Distance Verification in Wireless Networks, tech. report EPFL/IC/200443, Swiss Federal Inst. of Tech., May 2004.
  • 5
    • 0034858411 scopus 로고    scopus 로고
    • Hidden Terminal Jamming Problems in IEEE 802.11 Mobile Ad Hoc Networks
    • ICC, IEEE CS Press
    • C. Ware, T. Wysocki, and J.F. Chicharo, "Hidden Terminal Jamming Problems in IEEE 802.11 Mobile Ad Hoc Networks," Prof. IEEE Int'l Conf. Communications (ICC), IEEE CS Press, 2001, pp. 262-265.
    • (2001) Prof. IEEE Int'l Conf. Communications , pp. 262-265
    • Ware, C.1    Wysocki, T.2    Chicharo, J.F.3
  • 6
    • 0037003792 scopus 로고    scopus 로고
    • Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
    • MILCOM, IEEE CS Press
    • V. Gupta, S. Krishnamurthy, and M. Faloutsos, "Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks," Proc. IEEE Military Communications Conf. (MILCOM), IEEE CS Press, 2002, pp. 1118-1123.
    • (2002) Proc. IEEE Military Communications Conf , pp. 1118-1123
    • Gupta, V.1    Krishnamurthy, S.2    Faloutsos, M.3
  • 8
    • 0034771532 scopus 로고    scopus 로고
    • TCP Westwood: Bandwidth Estimation for Enhanced Transport over Wireless Links
    • MOBICOM, ACM Press
    • S. Mascolo et al., "TCP Westwood: Bandwidth Estimation for Enhanced Transport over Wireless Links," Proc. 7th ACM Int'l Conf. Mobile Computing and Networking (MOBICOM), ACM Press, 2001, pp. 287-297.
    • (2001) Proc. 7th ACM Int'l Conf. Mobile Computing and Networking , pp. 287-297
    • Mascolo, S.1
  • 9
    • 29844457889 scopus 로고    scopus 로고
    • The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks
    • ACM Press
    • W. Xu et al., "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. 6th ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, ACM Press, 2005, pp. 46-57.
    • (2005) Proc. 6th ACM Int'l Symp. Mobile Ad Hoc Networking and Computing , pp. 46-57
    • Xu, W.1
  • 11
    • 0242696170 scopus 로고    scopus 로고
    • ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Adhoc Networks
    • ACM Press
    • J. Kong and X. Hong, "ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Adhoc Networks," ACM Int'l Symp. Mobile Ad-Hoc Networking and Computing, ACM Press, 2003, pp. 291-302.
    • (2003) ACM Int'l Symp. Mobile Ad-Hoc Networking and Computing , pp. 291-302
    • Kong, J.1    Hong, X.2
  • 12
    • 33847758837 scopus 로고    scopus 로고
    • WCTG Report for Darpa, Nat'1 Inst. Standards and Technology Wireless Comm. Technologies Group, Apr
    • L.E. Miller, Why UWB? A Review of Ultrawideband Technology, WCTG Report for Darpa, Nat'1 Inst. Standards and Technology Wireless Comm. Technologies Group, Apr. 2003.
    • (2003) Why UWB? A Review of Ultrawideband Technology
    • Miller, L.E.1
  • 13
    • 3042643459 scopus 로고    scopus 로고
    • Autonomic 802.11 Wireless LAN Security Auditing
    • J.W Branch et al., "Autonomic 802.11 Wireless LAN Security Auditing," IEEE Security & Privacy, vol. 2, no. 3, 2004, pp. 56-64.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.3 , pp. 56-64
    • Branch, J.W.1
  • 14
    • 4544324338 scopus 로고    scopus 로고
    • DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots
    • ACM Press
    • M. Raya, J.P. Hubaux, and I. Aad, "DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots," ACM MobiSys, ACM Press, 2004, pp. 84-97.
    • (2004) ACM MobiSys , pp. 84-97
    • Raya, M.1    Hubaux, J.P.2    Aad, I.3
  • 16
    • 33847735232 scopus 로고    scopus 로고
    • A Methodology for the Analysis of 802.1 la Links in Industrial Environments
    • IEEE CS Press
    • D. Brevi et al., "A Methodology for the Analysis of 802.1 la Links in Industrial Environments," IEEE Int'l Workshop on Factory Comm. Systems, IEEE CS Press, 2006, pp. 165-174.
    • (2006) IEEE Int'l Workshop on Factory Comm. Systems , pp. 165-174
    • Brevi, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.