메뉴 건너뛰기




Volumn 30, Issue 8, 2007, Pages 1841-1853

DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks

Author keywords

Ad hoc network; MAC; Performance evaluation; Routing; Security

Indexed keywords

COMPUTER SIMULATION; MEDIUM ACCESS CONTROL; NETWORK ROUTING; SECURITY OF DATA;

EID: 34247504187     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2007.02.014     Document Type: Article
Times cited : (19)

References (16)
  • 1
    • 34247528661 scopus 로고    scopus 로고
    • IEEE802.11 wireless LAN media access control (MAC) and physical layer (PHY) specifications, 1999.
  • 2
    • 11244252132 scopus 로고    scopus 로고
    • I. Aad, J.P. Hubaux, E.W. Knightly, Denial of service resilience in ad hoc networks, in: Proc. of ACM MobiCom, September 2004.
  • 3
    • 84925368904 scopus 로고    scopus 로고
    • J. Bellardo, S. Savage, 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, in: USENIX, 2003.
  • 4
    • 0242696192 scopus 로고    scopus 로고
    • S. Buchegger, J.-Y.L. Boudec, Performance analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks), in: The ACM Symposium on Mobile Adhoc Networking and Computing (MOBIHOC 2002), Lausanne, Switzerland, June 9-11, 2002.
  • 5
    • 34247514031 scopus 로고    scopus 로고
    • A. Cárdenas, S. Radosavac, J.S. Baras, Detection and prevention of MAC layer misbehavior for ad hoc networks, in: Proc. of SASN, October 2004.
  • 6
    • 34247471298 scopus 로고    scopus 로고
    • K. Fall, K. Varadhan, NS notes and documentation, Technical Report, UC Berkley, LBL, USC/ISI, in: Xerox PARC, 2002.
  • 7
    • 31844455819 scopus 로고    scopus 로고
    • L. Guang, C. Assi, On the resiliency of ad hoc networks to MAC layer misbehavior, in: Workshop on PE-WASUN, ACM Ms WiM, October 2005.
  • 8
    • 33747325673 scopus 로고    scopus 로고
    • L. Guang, C. Assi, Vulnerabilities of ad hoc network routing protocols to MAC misbehavior, in: IEEE WiMob, August 2005.
  • 9
    • 34247489321 scopus 로고    scopus 로고
    • Vulnerabilities assessment of ad hoc networks to MAC layer misbehavior
    • Wiley 10.1002/wcm.39
    • Guang L., and Assi C. Vulnerabilities assessment of ad hoc networks to MAC layer misbehavior. Wireless Communication and Mobile Computing (2007), Wiley 10.1002/wcm.39
    • (2007) Wireless Communication and Mobile Computing
    • Guang, L.1    Assi, C.2
  • 10
    • 33750915973 scopus 로고    scopus 로고
    • L. Guang, C. Assi, A. Benslimane, Modeling and analysis of predictable random backoff in selfish environments, in: Proc. of ACM MsWiM, October 2006.
  • 11
    • 0037003792 scopus 로고    scopus 로고
    • V. Gupta, S. Krishnamurthy, M. Faloutsous, Denial of service attacks at the MAC layer in wireless ad hoc networks, in: Proc. of MILCOM, 2002.
  • 13
    • 85177499750 scopus 로고    scopus 로고
    • S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Mobile Computing and Networking, 2000.
  • 14
    • 34247501384 scopus 로고    scopus 로고
    • P. Papadimitratos, Z. Haas, Secure routing for mobile ad hoc networks, in: Proc. of CNDS, 2002.
  • 15
    • 4544324338 scopus 로고    scopus 로고
    • M. Raya, J.P. Hubaux, I. Aad, DOMINO: a system to detect greedy behavior in ieee 802.11 hotspots, in: Proc. of ACM MobiSys, June 2004.
  • 16
    • 34247487067 scopus 로고    scopus 로고
    • Y. Zhou, D. Wu, S. Nettles, Analyzing and preventing MAC-layer denial of service attacks for stock 802.11 systems, in: Workshop on BWSA, BROADNETS, October 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.