메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK PROTOCOLS; PACKET NETWORKS; TELECOMMUNICATION TRAFFIC; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 35148886678     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2006.302162     Document Type: Conference Paper
Times cited : (28)

References (26)
  • 2
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," in IEEE Wireless Communications, vol. 11, no. 1, 2004. pp. 48-60.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 4
    • 35148865932 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Rice University Dept. of Computer Science, Technical Report TR01-384
    • D. B. J. Yih-Chun Hu, Adrian Perrig, "Packet leashes: A defense against wormhole attacks in wireless networks," Rice University Dept. of Computer Science, Technical Report TR01-384, 2001.
    • (2001)
    • Yih-Chun Hu, D.B.J.1    Perrig, A.2
  • 5
    • 0004118143 scopus 로고    scopus 로고
    • A secure routing protocol for ad hoc networks
    • Dept. of Computer Science, University of Massachusetts, Ahmerst, Technical Report Tech Report 02-32
    • B. Dahill, B. Levine, E. Royer, and C. Shields, "A secure routing protocol for ad hoc networks," Dept. of Computer Science, University of Massachusetts, Ahmerst, Technical Report Tech Report 02-32, 2001.
    • (2001)
    • Dahill, B.1    Levine, B.2    Royer, E.3    Shields, C.4
  • 6
    • 35148814682 scopus 로고    scopus 로고
    • W. Wang and B. Bhargava, Visualization of wormholes in sensor networks, in Proceedings of the 2004 ACM workshop on Wireless Security. Philadelphia, PA, U.S.A: WiSe'04, October 2004, pp. 5160.
    • W. Wang and B. Bhargava, "Visualization of wormholes in sensor networks," in Proceedings of the 2004 ACM workshop on Wireless Security. Philadelphia, PA, U.S.A: WiSe'04, October 2004, pp. 5160.
  • 7
    • 35148851762 scopus 로고    scopus 로고
    • N. W. Group, Optimized link state routing protocol, IETF. Tech. Rep. RFC 3626, 2003.
    • N. W. Group, "Optimized link state routing protocol," IETF. Tech. Rep. RFC 3626, 2003.
  • 11
    • 11244264140 scopus 로고    scopus 로고
    • L. Lazos and R. Poovendran, Serloc: Secure range-independent localization for wireless sensor networks, in Proceedings of the ACM Workshop on Wireless Security. Philadelphia, PA, U.S.A: WiSe'04, October 2004, pp. 21-30.
    • L. Lazos and R. Poovendran, "Serloc: Secure range-independent localization for wireless sensor networks," in Proceedings of the ACM Workshop on Wireless Security. Philadelphia, PA, U.S.A: WiSe'04, October 2004, pp. 21-30.
  • 13
    • 24744448664 scopus 로고    scopus 로고
    • Verifying physical presence of neighbors against replaybased attacks in wireless ad hoc networks
    • T. Korkmaz, "Verifying physical presence of neighbors against replaybased attacks in wireless ad hoc networks," in International Conference on Information Technology: Coding and Computing, vol. 2, 2005, pp. 704-709.
    • (2005) International Conference on Information Technology: Coding and Computing , vol.2 , pp. 704-709
    • Korkmaz, T.1
  • 16
    • 17144399950 scopus 로고    scopus 로고
    • Secure node misbehaviors in mobile ad hoc networks
    • Los Angeles, CA, U.S.A: IEEE, September
    • C. Chigan and R. Bandaru, "Secure node misbehaviors in mobile ad hoc networks," in Vehicular Technology Conference, vol. 7. Los Angeles, CA, U.S.A: IEEE, September 2004, pp. 4730-4734.
    • (2004) Vehicular Technology Conference , vol.7 , pp. 4730-4734
    • Chigan, C.1    Bandaru, R.2
  • 17
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • IEEE, February
    • H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in mobile ad hoc networks: Challenges and solutions," in IEEE Wireless Communications, vol. 7. IEEE, February 2004.
    • (2004) IEEE Wireless Communications , vol.7
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 20
    • 33847279913 scopus 로고    scopus 로고
    • B. Awerbuch, R. Curtmola, D. Holmer, herbert Rubens, and C. NitaRotaru, On the survivability of routing protocols in ad hoc wireless networks, in Conference on Security and Privacy for Emerging Areas in Communications. Athens, Greece: SecureComm 2005, September 2005.
    • B. Awerbuch, R. Curtmola, D. Holmer, herbert Rubens, and C. NitaRotaru, "On the survivability of routing protocols in ad hoc wireless networks," in Conference on Security and Privacy for Emerging Areas in Communications. Athens, Greece: SecureComm 2005, September 2005.
  • 21
    • 35148877522 scopus 로고    scopus 로고
    • L. Hu and D. Evans, Using directional antennas to prevent wormhole attacks, in Proceedings of the 11th Network and Distributed System Security Symposium. San Diego, California: NDSS 04, February 2004, pp. 131-141.
    • L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks," in Proceedings of the 11th Network and Distributed System Security Symposium. San Diego, California: NDSS 04, February 2004, pp. 131-141.
  • 22
    • 24944466187 scopus 로고    scopus 로고
    • Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach
    • L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. Chang, "Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach," in IEEE Communication Society. WCNC 2005, 2005.
    • IEEE Communication Society , vol.WCNC 2005 , pp. 2005
    • Lazos, L.1    Poovendran, R.2    Meadows, C.3    Syverson, P.4    Chang, L.5
  • 23
    • 0142187757 scopus 로고    scopus 로고
    • Preventing replay attacks for secure routing in ad hoc networks
    • Montreal, Canada: ADHOCNOW, October
    • J. Zhen and S. Srinivas, "Preventing replay attacks for secure routing in ad hoc networks," in ADHOC-NOW 2003. Montreal, Canada: ADHOCNOW, October 2003, pp. 140-150.
    • (2003) ADHOC-NOW 2003 , pp. 140-150
    • Zhen, J.1    Srinivas, S.2
  • 24
    • 35148835933 scopus 로고    scopus 로고
    • An effective intrusion detection approach for the optimized link state routing (olsr) mobile ad hoc networking protocol
    • Boston, Massachusetts, USA, November
    • M. Wang, L. Lamont, M. Gorlatova, and P. Mason, "An effective intrusion detection approach for the optimized link state routing (olsr) mobile ad hoc networking protocol," in Proceedings of the First Workshop on Secure Network Protocols (NPSec), Boston, Massachusetts, USA, November 2005.
    • (2005) Proceedings of the First Workshop on Secure Network Protocols (NPSec)
    • Wang, M.1    Lamont, L.2    Gorlatova, M.3    Mason, P.4
  • 25
    • 33847409541 scopus 로고    scopus 로고
    • The nrl mobile network emulator
    • Monterey, CA, U.S.A, October
    • J. W. W. Chao, Joe Macker, "The nrl mobile network emulator." in IEEE MILCOM, Monterey, CA, U.S.A, October 2003, pp. 131-144.
    • (2003) IEEE MILCOM , pp. 131-144
    • Chao, J.W.W.1    Macker, J.2
  • 26
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • September
    • Y. Zhang, W. Lee, and Y Huang, "Intrusion detection techniques for mobile wireless networks," Wireless Networks, vol. 9, pp. 545-546, September 2003.
    • (2003) Wireless Networks , vol.9 , pp. 545-546
    • Zhang, Y.1    Lee, W.2    Huang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.