메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 55-64

Modeling ad-hoc rushing attack in a negligibility-based security framework

Author keywords

Asymptotic invariant; Negligibility; Randomized network algorithms; Randomized turing machine; Scalability; Sub polynomial

Indexed keywords

ASYMPTOTIC INVARIANT; NEGLIGIBILITY; RANDOMIZED NETWORK ALGORITHMS; RANDOMIZED TURING MACHINE; SUB POLYNOMIAL;

EID: 34247350837     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1161289.1161302     Document Type: Conference Paper
Times cited : (6)

References (27)
  • 1
    • 11244252132 scopus 로고    scopus 로고
    • Denial of Service Resilience in Ad Hoc Networks
    • I. Aad, J.-P. Hubaux, and E. W. Knightly. Denial of Service Resilience in Ad Hoc Networks. In ACM MOBICOM, pages 202-215, 2004.
    • (2004) ACM MOBICOM , pp. 202-215
    • Aad, I.1    Hubaux, J.-P.2    Knightly, E.W.3
  • 5
    • 84976295016 scopus 로고
    • Distance-Bounding Protocols (Extended Abstract)
    • T. Helleseth, editor, EUROCRYPT'93
    • S. Brands and D. Chaum. Distance-Bounding Protocols (Extended Abstract). In T. Helleseth, editor, EUROCRYPT'93, Lecture Notes in Computer Science 765, pages 344-359, 1993.
    • (1993) Lecture Notes in Computer Science , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 6
    • 85106319926 scopus 로고    scopus 로고
    • A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
    • J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In ACM MOBICOM, pages 85-97, 1998.
    • (1998) ACM MOBICOM , pp. 85-97
    • Broch, J.1    Maltz, D.A.2    Johnson, D.B.3    Hu, Y.-C.4    Jetcheva, J.5
  • 9
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks. In ACM MOBICOM, pages 12-23, 2002.
    • (2002) ACM MOBICOM , pp. 12-23
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 10
    • 0041973497 scopus 로고    scopus 로고
    • Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In IEEE INFOCOM, 2003.
    • (2003) IEEE INFOCOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 12
    • 34247389249 scopus 로고    scopus 로고
    • A Framework for Location Privacy in Wireless Networks
    • Y.-C. Hu and H. J. Wang. A Framework for Location Privacy in Wireless Networks. In ACM SIGCOMM Asia Workshop, 2005.
    • (2005) ACM SIGCOMM Asia Workshop
    • Hu, Y.-C.1    Wang, H.J.2
  • 13
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic Source Routing in Ad Hoc Wireless Networks
    • T. Imielinski and H. Korth, editors, Kluwer Academic Publishers
    • D. B. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In T. Imielinski and H. Korth, editors, Mobile Computing, volume 353, pages 153-181. Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , vol.353 , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 14
    • 34247386384 scopus 로고    scopus 로고
    • GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks
    • Technical Report 2006/140, IACR Cryptology ePrint Archive, April 2006
    • J. Kong. GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks. Technical Report 2006/140, IACR Cryptology ePrint Archive, April 2006.
    • Kong, J.1
  • 15
    • 0242696170 scopus 로고    scopus 로고
    • ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks
    • J. Kong and X. Hong. ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In ACM MOBIHOC'03, pages 291-302, 2003.
    • (2003) ACM MOBIHOC'03 , pp. 291-302
    • Kong, J.1    Hong, X.2
  • 16
    • 29844455972 scopus 로고    scopus 로고
    • L'Hospital: Self-healing Secure Routing for Mobile Ad-hoc Networks
    • Technical Report CSD-TR040055, Dept. of Computer Science, UCLA, January
    • J. Kong, X. Hong, J.-S. Park, Y. Yi, and M. Gerla. L'Hospital: Self-healing Secure Routing for Mobile Ad-hoc Networks. Technical Report CSD-TR040055, Dept. of Computer Science, UCLA, January 2005.
    • (2005)
    • Kong, J.1    Hong, X.2    Park, J.-S.3    Yi, Y.4    Gerla, M.5
  • 17
    • 29844454971 scopus 로고    scopus 로고
    • A Secure Ad-hoc Routing Approach using Localized Self-healing Communities
    • J. Kong, X. Hong, Y. Yi, J.-S. Park, J. Liu, and M. Gerla. A Secure Ad-hoc Routing Approach using Localized Self-healing Communities. In ACM MOBIHOC'05, pages 254-265, 2005.
    • (2005) ACM MOBIHOC'05 , pp. 254-265
    • Kong, J.1    Hong, X.2    Yi, Y.3    Park, J.-S.4    Liu, J.5    Gerla, M.6
  • 18
    • 33745971800 scopus 로고    scopus 로고
    • Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes
    • J. Kong, D. Wu, X. Hong, and M. Gerla. Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes. In ACM SASN'05 in conjunction with CCS'06, pages 97-106, 2005.
    • (2005) ACM SASN'05 in conjunction with CCS'06 , pp. 97-106
    • Kong, J.1    Wu, D.2    Hong, X.3    Gerla, M.4
  • 19
    • 0035703920 scopus 로고    scopus 로고
    • Ad Hoc On-demand Multipath Distance Vector Routing
    • M. K. Marina and S. R. Das. Ad Hoc On-demand Multipath Distance Vector Routing. In IEEE ICNP, pages 14-23, 2001.
    • (2001) IEEE ICNP , pp. 14-23
    • Marina, M.K.1    Das, S.R.2
  • 22
    • 34347349933 scopus 로고    scopus 로고
    • Ad-Hoc On-Demand Distance Vector Routing
    • C. E. Perkins and E. M. Royer. Ad-Hoc On-Demand Distance Vector Routing. In IEEE WMCSA'99, pages 90-100, 1999.
    • (1999) IEEE WMCSA'99 , pp. 90-100
    • Perkins, C.E.1    Royer, E.M.2
  • 23
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA Broadcast Authentication Protocol
    • A. Perrig, R. Canetti, D. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, 5(2):2-13, 2002.
    • (2002) RSA CryptoBytes , vol.5 , Issue.2 , pp. 2-13
    • Perrig, A.1    Canetti, R.2    Tygar, D.3    Song, D.4
  • 26
    • 33750338032 scopus 로고    scopus 로고
    • Bypass Routing: An On-Demand Local Recovery Protocol for Ad Hoc Networks
    • C. Sengul and R. Kravets. Bypass Routing: An On-Demand Local Recovery Protocol for Ad Hoc Networks. In Med-Hoc-Net, 2004.
    • (2004) Med-Hoc-Net
    • Sengul, C.1    Kravets, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.