메뉴 건너뛰기




Volumn 6, Issue 1, 2007, Pages 3-17

Interactive wormhole detection and evaluation

Author keywords

Interactive detection; Topology visualization; Visualization on network security; Wireless networks; Wormhole attacks

Indexed keywords

ALGORITHMS; COMPUTER HARDWARE; INFORMATION ANALYSIS; REAL TIME SYSTEMS; ROUTING PROTOCOLS; WIRELESS NETWORKS;

EID: 34247165074     PISSN: 14738716     EISSN: 14738724     Source Type: Journal    
DOI: 10.1057/palgrave.ivs.9500144     Document Type: Conference Paper
Times cited : (15)

References (50)
  • 1
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • Boston, MA
    • Zhang Y, Lee W. Intrusion detection in wireless ad-hoc networks. Proceedings of ACM MobiCom, Boston, MA, 2000; 275-283.
    • (2000) Proceedings of ACM MobiCom , pp. 275-283
    • Zhang, Y.1    Lee, W.2
  • 2
    • 32344436245 scopus 로고    scopus 로고
    • Anomaly intrusion detection in wireless sensor networks
    • Bhuse V, Gupta A. Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks 2006; 15(1):33-51.
    • (2006) Journal of High Speed Networks , vol.15 , Issue.1 , pp. 33-51
    • Bhuse, V.1    Gupta, A.2
  • 4
  • 7
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Zhang Y, Lee W, Huang Y. Intrusion detection techniques for mobile wireless networks. Wireless Networks Journal 2003; 9(5):545-556.
    • (2003) Wireless Networks Journal , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.3
  • 9
    • 33749537716 scopus 로고    scopus 로고
    • Visual correlation of host processes and traffic
    • Minneapolis, Minnesota
    • Fink G, Muessig P, North C. Visual correlation of host processes and traffic. Proceedings of VizSEC 2005, Minneapolis, Minnesota.
    • (2005) Proceedings of VizSEC
    • Fink, G.1    Muessig, P.2    North, C.3
  • 10
    • 33749519234 scopus 로고    scopus 로고
    • IDGraphs: Intrusion detection and analysis using histographs
    • Minneapolis, Minnesota
    • Ren P, Gao Y, Li Z, Chen Y, Watson B. IDGraphs: intrusion detection and analysis using histographs. Proceedings of VizSEC 2005, Minneapolis, Minnesota.
    • (2005) Proceedings of VizSEC
    • Ren, P.1    Gao, Y.2    Li, Z.3    Chen, Y.4    Watson, B.5
  • 11
    • 33749532337 scopus 로고    scopus 로고
    • Preserving the big picture: Visual network traffic analysis with TNV
    • Minneapolis, Minnesota
    • Goodall J, Rheingans P, Lutters W, Komlodi A. Preserving the big picture: visual network traffic analysis with TNV. Proceedings of VizSEC 2005, Minneapolis, Minnesota.
    • (2005) Proceedings of VizSEC
    • Goodall, J.1    Rheingans, P.2    Lutters, W.3    Komlodi, A.4
  • 12
    • 33749513452 scopus 로고    scopus 로고
    • A visualization methodology for characterization of network scans
    • Minneapolis, Minnesota
    • Muelder C, Ma K, Bartoletti T. A visualization methodology for characterization of network scans. Proceedings of VizSEC 2005, Minneapolis, Minnesota.
    • (2005) Proceedings of VizSEC
    • Muelder, C.1    Ma, K.2    Bartoletti, T.3
  • 13
    • 0004118143 scopus 로고    scopus 로고
    • A secure routing protocol for ad hoc networks
    • Technical report CS-02-32, University of Massachusetts
    • Dahill B, Levine B, Royer E, Shields C. A secure routing protocol for ad hoc networks. Technical report CS-02-32, University of Massachusetts, 2001.
    • (2001)
    • Dahill, B.1    Levine, B.2    Royer, E.3    Shields, C.4
  • 14
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • San Francisco, CA
    • Hu Y, Perrig A, Johnson D. Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. Proceedings of IEEE NFOCOM 2003, San Francisco, CA.
    • (2003) Proceedings of IEEE NFOCOM
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 15
  • 16
    • 84977898401 scopus 로고    scopus 로고
    • Using directional antennas to prevent wormhole attacks
    • San Diego, California
    • Hu L, Evans D. Using directional antennas to prevent wormhole attacks. Proceedings of NDSS 2004, San Diego, California.
    • (2004) Proceedings of NDSS
    • Hu, L.1    Evans, D.2
  • 17
    • 33144488116 scopus 로고    scopus 로고
    • Low-cost attacks against packet delivery localization and time synchronization services in under-water sensor networks
    • Cologne, Germany;
    • Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B. Low-cost attacks against packet delivery localization and time synchronization services in under-water sensor networks. Proceedings of ACM Wireless Security (WiSe) 2005; Cologne, Germany; 87-96.
    • (2005) Proceedings of ACM Wireless Security (WiSe) , pp. 87-96
    • Kong, J.1    Ji, Z.2    Wang, W.3    Gerla, M.4    Bagrodia, R.5    Bhargava, B.6
  • 20
    • 16244412939 scopus 로고    scopus 로고
    • Steerable, progressive multidimensional scaling
    • Austin, Texas
    • Williams M, Munzner T. Steerable, progressive multidimensional scaling. Proceedings of InfoVis 2004, Austin, Texas.
    • (2004) Proceedings of InfoVis
    • Williams, M.1    Munzner, T.2
  • 23
    • 0013824247 scopus 로고
    • Multidimensional scaling of similarity
    • Torgeson W. Multidimensional scaling of similarity. Psychometrika 1965; 30: 379-393.
    • (1965) Psychometrika , vol.30 , pp. 379-393
    • Torgeson, W.1
  • 25
    • 8344227634 scopus 로고    scopus 로고
    • Sensor positioning in wireless ad-hoc sensor networks with multidimensional scaling
    • Hong Kong
    • Ji X, Zha H. Sensor positioning in wireless ad-hoc sensor networks with multidimensional scaling. Proceedings of INFOCOM 2004, Hong Kong.
    • (2004) Proceedings of INFOCOM
    • Ji, X.1    Zha, H.2
  • 26
    • 3042823513 scopus 로고    scopus 로고
    • Semidefinite programming for ad hoc wireless sensor network localization
    • Berkeley, CA
    • Biswas P, Ye Y. Semidefinite programming for ad hoc wireless sensor network localization. Proceedings of ACM/IEEE IPSN 2004, Berkeley, CA.
    • (2004) Proceedings of ACM/IEEE IPSN
    • Biswas, P.1    Ye, Y.2
  • 27
    • 33845916834 scopus 로고    scopus 로고
    • Poovendran R, Lazos L. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM Journal on Wireless Networks (WINET) 2007, accepted for publication.
    • Poovendran R, Lazos L. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM Journal on Wireless Networks (WINET) 2007, accepted for publication.
  • 30
    • 0034775930 scopus 로고    scopus 로고
    • Dynamic fine-grained localization in ad-hoc networks of sensors
    • Long Beach, California
    • Savvides A, Han C, Srivastava M. Dynamic fine-grained localization in ad-hoc networks of sensors. Proceedings of MobiCom 2001, Long Beach, California.
    • (2001) Proceedings of MobiCom
    • Savvides, A.1    Han, C.2    Srivastava, M.3
  • 31
    • 0041973656 scopus 로고    scopus 로고
    • Ad hoc positioning system (APS) using AoA
    • San Francisco, CA
    • Niculescu D, Nath B. Ad hoc positioning system (APS) using AoA. Proceedings of IEEE INFOCOM 2003, San Francisco, CA.
    • (2003) Proceedings of IEEE INFOCOM
    • Niculescu, D.1    Nath, B.2
  • 32
    • 20444447760 scopus 로고    scopus 로고
    • Home-centric visualization of network traffic for security administration
    • Fairfax, Virginia
    • Ball R, Fink G, Rathi A, Shah S, North C. Home-centric visualization of network traffic for security administration. Proceedings of ACM VizSEC 2004, Fairfax, Virginia.
    • (2004) Proceedings of ACM VizSEC
    • Ball, R.1    Fink, G.2    Rathi, A.3    Shah, S.4    North, C.5
  • 37
    • 33749445428 scopus 로고    scopus 로고
    • Effectively visualizing large networks through sampling
    • Minneapolis, Minnesota
    • Rafiei D, Curial S. Effectively visualizing large networks through sampling. Proceedings of IEEE Visualization 2005, Minneapolis, Minnesota.
    • (2005) Proceedings of IEEE Visualization
    • Rafiei, D.1    Curial, S.2
  • 39
    • 34147120474 scopus 로고
    • A note on two problems in connexion with graphs
    • Dljkstra EW. A note on two problems in connexion with graphs. Numerische Mathematik 1959; 1: 269-271.
    • (1959) Numerische Mathematik , vol.1 , pp. 269-271
    • Dljkstra, E.W.1
  • 40
    • 0030406791 scopus 로고    scopus 로고
    • A linear iteration time layout algorithm for visualizing high dimensional data
    • San Francisco, CA;
    • Chalmers M. A linear iteration time layout algorithm for visualizing high dimensional data. Proceedings IEEE Visualization 1996; San Francisco, CA; 127-132.
    • (1996) Proceedings IEEE Visualization , pp. 127-132
    • Chalmers, M.1
  • 44
    • 34247176956 scopus 로고    scopus 로고
    • IEC Workshop on Internet Simulations with the NS simulator 2000, San Diego, CA.
    • IEC Workshop on Internet Simulations with the NS simulator 2000, San Diego, CA.
  • 45
    • 26644463857 scopus 로고    scopus 로고
    • accessed 20 July, 2006
    • The Network Simulator - ns-2 http://www.isi.edu/nsnam/ns/ (accessed 20 July, 2006).
    • The Network Simulator - ns-2
  • 46
    • 3042802118 scopus 로고    scopus 로고
    • The node distribution of the random waypoint mobility model for wireless ad hoc networks
    • Bettstetter C, Resta G, Santi P. The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Transactions on Mobile Computing 2003; 2: 257-269.
    • (2003) IEEE Transactions on Mobile Computing , vol.2 , pp. 257-269
    • Bettstetter, C.1    Resta, G.2    Santi, P.3
  • 47
    • 85084163355 scopus 로고    scopus 로고
    • Robust positioning algorithms for distributed ad-hoc wireless sensor networks
    • Monterey, CA
    • Savarese C, Rabay J, Langendoen K. Robust positioning algorithms for distributed ad-hoc wireless sensor networks. USENIX Technical Annual Conference 2002, Monterey, CA.
    • (2002) USENIX Technical Annual Conference
    • Savarese, C.1    Rabay, J.2    Langendoen, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.