메뉴 건너뛰기




Volumn , Issue , 2006, Pages 135-146

Impact of optimal MAC layer attacks on the network layer

Author keywords

Ad hoc networks; Cross layer; MAC layer; Minmax robust detection; Protocol misbehavior

Indexed keywords

INTRUSION DETECTION SYTEMS (IDS); MINMAX ROBUST DETECTION; PROTOCOL MISBEHAVIOR; WIRELESS AD HOC NETWORKS;

EID: 34547422843     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180345.1180362     Document Type: Conference Paper
Times cited : (4)

References (13)
  • 2
    • 0023670186 scopus 로고
    • Conditional limit theorems under Markov conditioning
    • p.p, Nov
    • I. Csiszar, T. Cover and B-S. Choi, "Conditional limit theorems under Markov conditioning", IEEE Trans. on Information Theory, vol. 33, No. 6, p.p. 788-801, Nov. 1987.
    • (1987) IEEE Trans. on Information Theory , vol.33 , Issue.6 , pp. 788-801
    • Csiszar, I.1    Cover, T.2    Choi, B.-S.3
  • 3
    • 34547459925 scopus 로고    scopus 로고
    • IEEE, IEEE Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999.
    • IEEE, IEEE Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999.
  • 4
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • p.p
    • D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks", Mobile Computing, p.p. 153-181, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 5
    • 16244383830 scopus 로고    scopus 로고
    • A cautionary perspective on cross-layer design
    • p.p, February
    • V. Kawadia and P. R. Kumar,"A cautionary perspective on cross-layer design", IEEE Wireless Communications, Vol. 12, No. 1, p.p. 3-11, February 2005.
    • (2005) IEEE Wireless Communications , vol.12 , Issue.1 , pp. 3-11
    • Kawadia, V.1    Kumar, P.R.2
  • 9
    • 34547435640 scopus 로고    scopus 로고
    • S. Radosavac, G. V. Moustakides, J. S. Baras and I. Koutsopoulos, An analytic framework for modeling and detecting access layer misbehavior in wireless networks, submitted to ACM Transactions on Information and System Security (TISSEC), 2006.
    • S. Radosavac, G. V. Moustakides, J. S. Baras and I. Koutsopoulos, "An analytic framework for modeling and detecting access layer misbehavior in wireless networks", submitted to ACM Transactions on Information and System Security (TISSEC), 2006.
  • 10
    • 0018877134 scopus 로고
    • Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy
    • p.p, January
    • J. E. Shore and R. W. Johnson, "Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy", IEEE Trans. on Information Theory, Vol. 26, No. 1, p.p. 26-37, January 1980.
    • (1980) IEEE Trans. on Information Theory , vol.26 , Issue.1 , pp. 26-37
    • Shore, J.E.1    Johnson, R.W.2
  • 11
    • 0019586465 scopus 로고
    • Properties of Cross-Entropy Minimization
    • p.p, July
    • J. E. Shore and R. W. Johnson, "Properties of Cross-Entropy Minimization", IEEE Trans. on Information Theory, Vol. 27, No. 4, p.p. 472-482, July 1981.
    • (1981) IEEE Trans. on Information Theory , vol.27 , Issue.4 , pp. 472-482
    • Shore, J.E.1    Johnson, R.W.2
  • 12
    • 77951119133 scopus 로고    scopus 로고
    • V. Srivastava and M. Motani, Cross-Layer Design: A Survey and the Road Ahead, In IEEE Communications Magazine, 43, p. p. 12-19, December 2005.
    • V. Srivastava and M. Motani, "Cross-Layer Design: A Survey and the Road Ahead", In IEEE Communications Magazine, Vol. 43, p. p. 12-19, December 2005.
  • 13
    • 0041473688 scopus 로고    scopus 로고
    • Y. Zhang, W. Lee and Y.-A. Huang, Intrusion detection techniques for mobile wireless networks, Wireless Networks, 9, No. 5, p. p. 545-556, 2003.
    • Y. Zhang, W. Lee and Y.-A. Huang, "Intrusion detection techniques for mobile wireless networks", Wireless Networks, Vol. 9, No. 5, p. p. 545-556, 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.