메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Understanding dynamic denial of service attacks in mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; COMPUTER CRIME; MESSAGE PASSING; NETWORK ROUTING; POWER CONTROL; PROBABILITY; PROGRAM PROCESSORS;

EID: 35148875021     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2006.302178     Document Type: Conference Paper
Times cited : (50)

References (19)
  • 1
    • 0037003792 scopus 로고    scopus 로고
    • Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
    • V. Gupta, S. Krishnamurthy, and M. Faloutsos, "Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks," in Proc. of IEEE MILCOM '02, 2002, pp. 1118-1123.
    • (2002) Proc. of IEEE MILCOM '02 , pp. 1118-1123
    • Gupta, V.1    Krishnamurthy, S.2    Faloutsos, M.3
  • 2
  • 3
    • 35148826261 scopus 로고    scopus 로고
    • Cross-Layer Attacks in Wireless Ad Hoc Networks
    • Princeton University
    • S. Radosavac, N. Benammar, and J. S. Baras, "Cross-Layer Attacks in Wireless Ad Hoc Networks," in Information Sciences and Systems. Princeton University, 2004, pp. 1266-1271.
    • (2004) Information Sciences and Systems , pp. 1266-1271
    • Radosavac, S.1    Benammar, N.2    Baras, J.S.3
  • 4
    • 0041973497 scopus 로고    scopus 로고
    • Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
    • March
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," in Proc. of IEEE INFOCOM '03., March 2003.
    • (2003) Proc. of IEEE INFOCOM '03
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 5
    • 3042667172 scopus 로고    scopus 로고
    • Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
    • September
    • _, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," in Proc. of ACM WiSe 2003., September 2003.
    • (2003) Proc. of ACM WiSe 2003
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 7
    • 33847372101 scopus 로고    scopus 로고
    • Increasing the DoS Attack Resiliency in Military Ad Hoc Networks
    • J. V. E. Molsa, "Increasing the DoS Attack Resiliency in Military Ad Hoc Networks," in Proc. of IEEE MILCOM '05, 2005, pp. 1-7.
    • (2005) Proc. of IEEE MILCOM '05 , pp. 1-7
    • Molsa, J.V.E.1
  • 8
    • 33846606856 scopus 로고    scopus 로고
    • Defending Against Packet Injection in Unreliable Ad Hoc Networks
    • Q. Gu, P. Liu, S. Zhu, and C.-H. Chu, "Defending Against Packet Injection in Unreliable Ad Hoc Networks," in Proc. of IEEE GLOBECOM '05, 2005.
    • (2005) Proc. of IEEE GLOBECOM '05
    • Gu, Q.1    Liu, P.2    Zhu, S.3    Chu, C.-H.4
  • 9
    • 24944490509 scopus 로고    scopus 로고
    • Mitigating Malicious Control Packet Floods in Ad Hoc Networks
    • S. Desilva and R. V. Boppana, "Mitigating Malicious Control Packet Floods in Ad Hoc Networks," in Proc. of IEEE WCNC '05, 2005, pp. 2112-2117.
    • (2005) Proc. of IEEE WCNC '05 , pp. 2112-2117
    • Desilva, S.1    Boppana, R.V.2
  • 10
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating Routing Misbehavior in Mobile Ad hoc Networks
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad hoc Networks," in Proc. of ACM MobiCom '00, 2000, pp. 255-265.
    • (2000) Proc. of ACM MobiCom '00 , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 12
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks
    • Atlanta, USA, Sept
    • Y. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks," in Proc. of MobiCom '02, Atlanta, USA, Sept. 2002.
    • (2002) Proc. of MobiCom '02
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3
  • 13
    • 0036793924 scopus 로고    scopus 로고
    • Denial of Service in Sensor Networks
    • Oct
    • A. D. Wood and J. A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer Magazine, vol. 35, no. 10, pp. 54-62, Oct 2002.
    • (2002) IEEE Computer Magazine , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 14
    • 0037086880 scopus 로고    scopus 로고
    • Revealing the Problems with 802.11 Medium Access Control Protocol in Multi-hop Wireless Ad Hoc Networks
    • S. Xu and T. Saadawi, "Revealing the Problems with 802.11 Medium Access Control Protocol in Multi-hop Wireless Ad Hoc Networks," Elsevier Journal of Computer Networks, vol. 38, no. 4, pp. 531-548, 2002.
    • (2002) Elsevier Journal of Computer Networks , vol.38 , Issue.4 , pp. 531-548
    • Xu, S.1    Saadawi, T.2
  • 16
    • 36348935385 scopus 로고    scopus 로고
    • Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes
    • F. Xing and W. Wang, "Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes," in Proc. of IEEE ICC '06., 2006.
    • (2006) Proc. of IEEE ICC '06
    • Xing, F.1    Wang, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.