메뉴 건너뛰기




Volumn 3224, Issue , 2004, Pages 125-145

Attack analysis and detection for ad hoc routing protocols

Author keywords

AODV; Attack analysis; Intrusion detection; MANET; Routing security

Indexed keywords

INTRUSION DETECTION; MERCURY (METAL); MOBILE SECURITY; MOBILE TELECOMMUNICATION SYSTEMS; ROUTING PROTOCOLS; SPECIFICATIONS; STATISTICS; TAXONOMIES; TELECOMMUNICATION NETWORKS;

EID: 34548323745     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30143-1_7     Document Type: Article
Times cited : (70)

References (20)
  • 4
    • 0003597249 scopus 로고    scopus 로고
    • Wormhole detection in wireless ad hoc networks
    • [HPJ01] Department of Computer Science, Rice University, December
    • [HPJ01] Y.-C. Hu, A. Perrig, and D. B. Johnson. Wormhole detection in wireless ad hoc networks. Technical Report TR01-384, Department of Computer Science, Rice University, December 2001.
    • (2001) Technical Report , vol.TR01-384
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 6
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • [IKP95]
    • [IKP95] K. Ilgun, R. A. Kemmerer, and P. A. Porras. State transition analysis: A rule-based intrusion detection approach. Software Engineering, 21(3):181-199, 1995.
    • (1995) Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 7
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks
    • [JMB01] C. E. Perkins, editor, chapter 5, Addison-Wesley
    • [JMB01] D. B. Johnson, D. A. Maltz, and J. Broch. DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. In C. E. Perkins, editor, Ad Hoc Networking, chapter 5, pages 139-172. Addison-Wesley, 2001.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2    Broch, J.3
  • 8
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • [KRL97]
    • [KRL97] C. Ko, M. Ruschitzka, and K. N. Levitt. Execution monitoring of security-critical programs in distributed systems: A specification-based approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 134-144, 1997.
    • (1997) Proceedings of the 1997 IEEE Symposium on Security and Privacy , pp. 134-144
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.N.3
  • 12
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • [MGLB00]
    • [MGLB00] S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255-265, 2000.
    • (2000) Mobile Computing and Networking , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 13
    • 84903836776 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
    • [NS03] June
    • [NS03] P. Ning and K. Sun. How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. In Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages 60-67, June 2003.
    • (2003) Proceedings of the 4th Annual IEEE Information Assurance Workshop , pp. 60-67
    • Ning, P.1    Sun, K.2
  • 19
    • 0003456435 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector (SAODV) routing
    • [Zap01] Internet Engineering Task Force, August expired
    • [Zap01] M. G. Zapata. Secure ad hoc on-demand distance vector (SAODV) routing. Internet draft draft-guerrero-manet-saodv-00.txt, Internet Engineering Task Force, August 2001. expired 2002.
    • (2001) Internet Draft Draft-guerrero-manet-saodv-00.txt , pp. 2002
    • Zapata, M.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.