메뉴 건너뛰기




Volumn 2, Issue 2, 2007, Pages 227-239

Defense against injecting traffic attacks in wireless mobile ad-hoc networks

Author keywords

Ad hoc networks; Attack models; Network security

Indexed keywords

ATTACK MODELS; DECENTRALIZED IMPLEMENTATION; DEFENSE MECHANISMS;

EID: 34249336750     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2007.897269     Document Type: Article
Times cited : (9)

References (27)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov./Dec
    • L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Netw. Mag., vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
    • (1999) IEEE Netw. Mag , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 6
    • 1542317831 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • presented at the, San Diego, CA, Sep
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols," presented at the ACM Workshop on Wireless Security, San Diego, CA, Sep. 2003.
    • (2003) ACM Workshop on Wireless Security
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 9
    • 29144503110 scopus 로고    scopus 로고
    • Attack-resistant cooperation stimulation in autonomous ad hoc networks
    • Dec
    • W. Yu and K. J. R. Liu, "Attack-resistant cooperation stimulation in autonomous ad hoc networks," IEEE J. Selected Areas Commun. Special Issue Autonomic Commun. Syst., vol. 23, no. 12, pp. 2260-2271, Dec. 2005.
    • (2005) IEEE J. Selected Areas Commun. Special Issue Autonomic Commun. Syst , vol.23 , Issue.12 , pp. 2260-2271
    • Yu, W.1    Liu, K.J.R.2
  • 13
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • presented at the
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks," presented at the IEEE Infocom, 2003.
    • (2003) IEEE Infocom
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 14
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," Ad Hoc Netw. J., vol. 1, pp. 175-192, 2003.
    • (2003) Ad Hoc Netw. J , vol.1 , pp. 175-192
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 15
    • 4444314479 scopus 로고    scopus 로고
    • Mobility helps security in ad hoc networks
    • Annapolis, MD, Jun
    • S. Capkun, J.-P. Hubaux, and L. Buttyan, "Mobility helps security in ad hoc networks," in Proc. MobiHOC, Annapolis, MD, Jun. 2003.
    • (2003) Proc. MobiHOC
    • Capkun, S.1    Hubaux, J.-P.2    Buttyan, L.3
  • 16
    • 34249335345 scopus 로고    scopus 로고
    • S. Capkun and J.-P. Hubaux, BISS: Building secure routing out of an incomplete set of security associations, presented at the WiSe, San Diego, CA, Sep. 2003.
    • S. Capkun and J.-P. Hubaux, "BISS: Building secure routing out of an incomplete set of security associations," presented at the WiSe, San Diego, CA, Sep. 2003.
  • 17
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol
    • S. Buchegger and J.-Y. Le Boudec, "Performance analysis of the CONFIDANT protocol," in Mobihoc, 2002, pp. 226-236.
    • (2002) Mobihoc , pp. 226-236
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 18
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • Oct
    • L. Buttyán and J.-P. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," Mobile Netw. Appl., vol. 8, no. 5, pp. 579-592, Oct. 2003.
    • (2003) Mobile Netw. Appl , vol.8 , Issue.5 , pp. 579-592
    • Buttyán, L.1    Hubaux, J.-P.2
  • 19
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • presented at the
    • S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," presented at the IEEE INFOCOM, 2003.
    • (2003) IEEE INFOCOM
    • Zhong, S.1    Chen, J.2    Yang, Y.R.3
  • 21
    • 85113133621 scopus 로고    scopus 로고
    • Core: A COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks
    • presented at the
    • P. Michiardi and R. Molva, "Core: A COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks," presented at the IFIP Commun. Multimedia Security Conf., 2002.
    • (2002) IFIP Commun. Multimedia Security Conf
    • Michiardi, P.1    Molva, R.2
  • 23
    • 0003807773 scopus 로고    scopus 로고
    • Upper Saddle River, NJ: Prentice-Hall
    • S. Haykin, Adaptive Filter Theory. Upper Saddle River, NJ: Prentice-Hall, 2001.
    • (2001) Adaptive Filter Theory
    • Haykin, S.1
  • 24
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks, mobile computing
    • T. Imielinski and H. Korth, Eds. Norwell, MA: Kluwer, ch. 5, pp
    • D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks, mobile computing," in Mobile Computing, T. Imielinski and H. Korth, Eds. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153-181.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 25
    • 0003629991 scopus 로고
    • Federal Inf. Process. Std. Publ. 180-1
    • Secure Hash Standard, 1995, Federal Inf. Process. Std. Publ. 180-1.
    • (1995) Secure Hash Standard
  • 26
    • 85177207285 scopus 로고    scopus 로고
    • J. Yoon, M. Liu, and B. Noble, Sound mobility models, presented at the MobiCom, San Diego, CA, Sep. 2003.
    • J. Yoon, M. Liu, and B. Noble, "Sound mobility models," presented at the MobiCom, San Diego, CA, Sep. 2003.
  • 27
    • 34249315450 scopus 로고    scopus 로고
    • Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE Std. 802.11-1007, IEEE Comput. Soc. LAN MAN Standards Committee, Inst. Elect. Elect. Eng.
    • Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE Std. 802.11-1007, IEEE Comput. Soc. LAN MAN Standards Committee, Inst. Elect. Elect. Eng.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.