메뉴 건너뛰기




Volumn 6, Issue 1, 2008, Pages 32-46

A study of different types of attacks on multicast in mobile ad hoc networks

Author keywords

Attack strategies; Multicast; Performance analysis; Security threats; Vulnerability analysis

Indexed keywords

AD HOC NETWORKS; COMPUTER SIMULATION; MESH GENERATION; MOBILE DEVICES; MULTICASTING;

EID: 34548827597     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2006.07.005     Document Type: Article
Times cited : (78)

References (26)
  • 1
    • 34548821639 scopus 로고    scopus 로고
    • Y.C. Hu, A. Perrig, D.B. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, in: Proceedings of ACM WiSe 2003, San Diego, CA, September 2003.
  • 2
    • 11244252132 scopus 로고    scopus 로고
    • I. Aad, J.P. Hubaux, E.W. Knightly, Denial of service resilience in ad hoc networks, in: Proceedings of ACM MobiCom 2004, Philadelphia, PA, September 2004.
  • 3
    • 85177199939 scopus 로고    scopus 로고
    • Y.C. Hu, A. Perrig, D.B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks, in: Proceedings of ACM MobiCom 2002, Atlanta, Georgia, September 2002.
  • 4
    • 0036924499 scopus 로고    scopus 로고
    • On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks
    • Lee S.J., Su W., and Gerla M. On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks. ACM/Kluwer Mobile Networks and Applications 7 6 (2002) 441-453
    • (2002) ACM/Kluwer Mobile Networks and Applications , vol.7 , Issue.6 , pp. 441-453
    • Lee, S.J.1    Su, W.2    Gerla, M.3
  • 6
    • 0242443809 scopus 로고    scopus 로고
    • S.K. Das, B.S. Manoj, C. Siva Ram Murthy, A dynamic core-based multicast routing protocol for ad hoc wireless networks, in: Proceedings of ACM MOBIHOC 2002, June 2002, pp. 24-35.
  • 7
    • 84954179089 scopus 로고    scopus 로고
    • S. Lee, C. Kim, Neighbor supporting ad hoc multicast routing protocol, in: Proceedings of ACM MOBIHOC 2000, August 2000, pp. 37-50.
  • 8
    • 34548819082 scopus 로고    scopus 로고
    • E.M. Royer, C.E. Perkins, Multicast operation of the ad hoc on-demand distance vector routing protocol, in: Proceedings of MobiCom'99, Seattle, WA, August 1999.
  • 9
    • 34548845089 scopus 로고    scopus 로고
    • C.W. Wu, Y.C. Tay, C.K. Toh, Ad hoc multicast routing protocol utilizing increasing id-numbers (amris) functional specification, Internet draft, work in progress, draft-ietf-manet-amris-spec-00.txt, November 1998.
  • 10
    • 34347349933 scopus 로고    scopus 로고
    • C.E. Perkins, E.M. Royer, S.R. Das, Ad hoc on demand distance vector (AODV) routing, in: Proceedings of IEEE WMCSA'99, New Orleans, LA, February 1999.
  • 11
    • 0036986441 scopus 로고    scopus 로고
    • B. Awerbuch, D. Holmer, C. Nita-Rotaru, H. Rubens, An on-demand secure routing protocol resilient to byzantine failures, in: Proceedings of ACM WiSe 2002, Atlanta, Georgia, September 2002.
  • 12
    • 85031307530 scopus 로고    scopus 로고
    • C.E. Perkins, P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, in: Proceedings of ACM SIGCOMM'94, August 1994.
  • 14
    • 34548837792 scopus 로고    scopus 로고
    • QualNet Simulator, Available from: .
  • 15
    • 0037003792 scopus 로고    scopus 로고
    • V. Gupta, S. Krishnamurthy, M. Faloutsos, Denial of service attacks at the MAC layer in wireless ad hoc networks, in: Proceedings of IEEE MILCOM'02, 2002.
  • 16
    • 84903836776 scopus 로고    scopus 로고
    • P. Ning, K. Sun, How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols, in: Proceedings of the 4th Annual IEEE Information Assurance Workshop, West Point, June 2003.
  • 17
    • 34548853470 scopus 로고    scopus 로고
    • B.Awerbuch, D. Holmer, C. Nita-Rotaru, H. Rubens, Mitigating byzantine attacks in ad hoc wireless networks, Technical Report, March 2004.
  • 18
    • 84961572484 scopus 로고    scopus 로고
    • Y.C. Hu, D.B. Johnson, A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, in: Proceedings of IEEE WMCSA'02, June 2002.
  • 19
    • 34548835806 scopus 로고    scopus 로고
    • K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer, A secure routing protocol for ad hoc networks, in: Proceedings of IEEE ICNP'02, Paris, France, November 2002.
  • 20
    • 34548816216 scopus 로고    scopus 로고
    • M. Zapata, N. Asokan, Securing ad hoc routing protocols, in: Proceedings of ACM WiSe 2002, Atlanta, GA, September 2002.
  • 21
    • 34548825716 scopus 로고    scopus 로고
    • P. Papadimitratos, Z.J. Hass, Secure routing for mobile ad hoc networks, in: Proceedings of CNDS'02, San Antonio, TX, January 2002.
  • 23
    • 0035789901 scopus 로고    scopus 로고
    • J.G. Jetcheva, D.B. Johnson, Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks, in: Proceedings of ACM MobiHoc'01, Long Beach, CA, October 2001.
  • 24
    • 0002736253 scopus 로고    scopus 로고
    • T. Ozaki, J.B. Kim, T. Suda, Bandwidth efficient multicast routing protocol for ad hoc networks, in: Proceedings of IEEE ICCCN'99, October 1999, pp. 10-17.
  • 25
    • 0004266615 scopus 로고    scopus 로고
    • Kluwer Academic Publishers., Norwell, MA pp. 153-181
    • Johnson D., and Maltz D. Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing (1996), Kluwer Academic Publishers., Norwell, MA pp. 153-181
    • (1996) Mobile Computing
    • Johnson, D.1    Maltz, D.2
  • 26
    • 0026910649 scopus 로고
    • Effects of Radio Propagation Path Loss on DS-CDMA Cellular Frequency Reuse Efficiency for the Reverse Channel
    • Rappaport T.S., and Milstein L.B. Effects of Radio Propagation Path Loss on DS-CDMA Cellular Frequency Reuse Efficiency for the Reverse Channel. IEEE Transactions on Vehicular Technology 41 3 (1992)
    • (1992) IEEE Transactions on Vehicular Technology , vol.41 , Issue.3
    • Rappaport, T.S.1    Milstein, L.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.