메뉴 건너뛰기




Volumn 7, Issue 6, 2007, Pages 703-715

Vulnerability assessment of ad hoc networks to MAC layer misbehavior

Author keywords

Ad hoc networks; MAC; Performance evaluation; Routing; Security

Indexed keywords

COMPUTER SIMULATION; MEDIUM ACCESS CONTROL; PACKET NETWORKS; SECURITY OF DATA;

EID: 34247489321     PISSN: 15308669     EISSN: None     Source Type: Journal    
DOI: 10.1002/wcm.391     Document Type: Article
Times cited : (4)

References (18)
  • 1
    • 34547944785 scopus 로고    scopus 로고
    • IEEE802.11 wireless LAN media access control (MAC) and physical layer (PHY) specifications. 1999.
    • IEEE802.11 wireless LAN media access control (MAC) and physical layer (PHY) specifications. 1999.
  • 2
    • 0037003792 scopus 로고    scopus 로고
    • Denial of service attacks at the mac layer in wireless ad hoc networks
    • October 7-10
    • Gupta V, Krishnamurthy S, Faloutsous M. Denial of service attacks at the mac layer in wireless ad hoc networks. In Proceedings of MILCOM, October 7-10, 2002.
    • (2002) Proceedings of MILCOM
    • Gupta, V.1    Krishnamurthy, S.2    Faloutsous, M.3
  • 4
    • 85008044268 scopus 로고    scopus 로고
    • Selfish MAC layer misbehavior in wire-less networks
    • DOI: 10.1109/TMC.2005.71
    • Kyasanur P, Vaidya N. Selfish MAC layer misbehavior in wire-less networks. IEEE Transactions on Mobile Computing 2005; 4(5): 502-516, DOI: 10.1109/TMC.2005.71.
    • (2005) IEEE Transactions on Mobile Computing , vol.4 , Issue.5 , pp. 502-516
    • Kyasanur, P.1    Vaidya, N.2
  • 7
    • 0016643763 scopus 로고
    • Packet switching in radio channels: The hidden terminal problem in carrier sense multiple access models and the busy tone solution
    • Tobagi FA, Kleinrock L. Packet switching in radio channels: the hidden terminal problem in carrier sense multiple access models and the busy tone solution. IEEE Transactions on Communications 1975; 23(12): 1417-1433.
    • (1975) IEEE Transactions on Communications , vol.23 , Issue.12 , pp. 1417-1433
    • Tobagi, F.A.1    Kleinrock, L.2
  • 13
    • 0032667063 scopus 로고    scopus 로고
    • Packet switching in radio channels: The effects of on-demand behavior in routing protocols for ad hoc networks
    • Maltz DA, Broch J, Jetcheva J, Johnson DB. Packet switching in radio channels: the effects of on-demand behavior in routing protocols for ad hoc networks. IEEE Journal on Selected Areas in Communications 1999; 17(8): 1439-1453.
    • (1999) IEEE Journal on Selected Areas in Communications , vol.17 , Issue.8 , pp. 1439-1453
    • Maltz, D.A.1    Broch, J.2    Jetcheva, J.3    Johnson, D.B.4
  • 16
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Washington, DC, August
    • Bellardo J, Savage S. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In USENIX'03: Proceedings of 12th USENIX Security Symposium., Washington, DC, August, 2003; 15-28.
    • (2003) USENIX'03: Proceedings of 12th USENIX Security Symposium , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 17
    • 0004194997 scopus 로고    scopus 로고
    • NS notes and documentation. Technical report, UC Berkley, LBL, USC/ISI
    • Fall K, Varadhan K. NS notes and documentation. Technical report, UC Berkley, LBL, USC/ISI. In Xerox PARC, 2002.
    • (2002) Xerox PARC
    • Fall, K.1    Varadhan, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.