메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Comparison of two intrusion detection schemes for sparsely connected ad hoc networks

Author keywords

Disruption tolerant networkst; DoS resilience; DSR; Intrusion detection; Routing; Sparsely connected adhoc networks

Indexed keywords

AD HOC NETWORKS; COMPUTER SIMULATION; NETWORK ROUTING; PACKET NETWORKS;

EID: 35148872603     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2006.302390     Document Type: Conference Paper
Times cited : (5)

References (17)
  • 2
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic Source Routing in Ad Hoc Networks
    • edited by T. Imielinski and H. Korth, Chapter 5, pp, Kluwer Academic Publishers
    • D. B. Johnson, D. Maltz, "Dynamic Source Routing in Ad Hoc Networks", Mobile Computing, edited by T. Imielinski and H. Korth, Chapter 5, pp 153-181, Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.2
  • 7
    • 85031307530 scopus 로고
    • Highly dynamic destination-sequenced distance vector routing (DSDV) for mobile computers
    • C. Perkins, P. Bhagwat, "Highly dynamic destination-sequenced distance vector routing (DSDV) for mobile computers", Proceedings of ACM Sigcomm, 1994.
    • (1994) Proceedings of ACM Sigcomm
    • Perkins, C.1    Bhagwat, P.2
  • 9
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless adhoc networks
    • April
    • Y.C. Hu etc, "Packet leashes: a defense against wormhole attacks in wireless adhoc networks", Proceedings of the IEEE Infocom, April 2003.
    • (2003) Proceedings of the IEEE Infocom
    • Hu, Y.C.1    etc2
  • 11
    • 0242453865 scopus 로고    scopus 로고
    • An On-Demand Secure Routing Protocol Resilient to Byzantine Failures
    • B.Awerbuch etc, "An On-Demand Secure Routing Protocol Resilient to Byzantine Failures", Proceedings of ACM WiSe, 2002.
    • (2002) Proceedings of ACM WiSe
    • Awerbuch, B.1    etc2
  • 14
    • 3042667172 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • Y. Hu, A. Perrig, D. B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols", Proceedings of ACM WiSe, 2003.
    • (2003) Proceedings of ACM WiSe
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3
  • 16
    • 35148848934 scopus 로고    scopus 로고
    • st Network/Computer Security Workshop, Lehigh University, Aug, 2005.
    • st Network/Computer Security Workshop, Lehigh University, Aug, 2005.
  • 17
    • 35148814259 scopus 로고    scopus 로고
    • K. Fall, W. Hong, S. Madden, Custody Transfer for Reliable Delivery in Delay Tolerant Networks, IRB-TR-33-030, July 2003.
    • K. Fall, W. Hong, S. Madden, "Custody Transfer for Reliable Delivery in Delay Tolerant Networks", IRB-TR-33-030, July 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.