메뉴 건너뛰기




Volumn , Issue , 2007, Pages 3117-3122

Detecting and avoiding wormhole attacks in optimized link state routing protocol

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; COMPUTER WORMS; INFORMATION RETRIEVAL; ROUTING PROTOCOLS; SYNCHRONIZATION;

EID: 36349035274     PISSN: 15253511     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNC.2007.576     Document Type: Conference Paper
Times cited : (17)

References (16)
  • 1
    • 0041973497 scopus 로고    scopus 로고
    • Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
    • Apr
    • Y.C. Hu, A. Perrig and D. B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In IEEE INFOCOM 2003, Apr. 2003.
    • (2003) In IEEE INFOCOM 2003
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 2
    • 1542317831 scopus 로고    scopus 로고
    • Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
    • ACM WiSe, Sep
    • Y.C. Hu, D. Johnson, A. Perrig. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In ACM Workshop on Wireless Security (ACM WiSe), Sep. 2003.
    • (2003) ACM Workshop on Wireless Security
    • Hu, Y.C.1    Johnson, D.2    Perrig, A.3
  • 8
    • 36348950082 scopus 로고    scopus 로고
    • L. Hu and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. In Network and Distributed System Security Symposium (NDSS), Feb. 2004.
    • L. Hu and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. In Network and Distributed System Security Symposium (NDSS), Feb. 2004.
  • 9
    • 24944567810 scopus 로고    scopus 로고
    • Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks through Statistical Analysis of Multipath
    • Mar
    • L. Qian, N. Song, X. Li. Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks through Statistical Analysis of Multipath. IEEE Wireless Communications & Netwoking Conference (IEEE WCNC), Mar. 2005.
    • (2005) IEEE Wireless Communications & Netwoking Conference (IEEE WCNC)
    • Qian, L.1    Song, N.2    Li, X.3
  • 13
    • 33847279913 scopus 로고    scopus 로고
    • B. Awerbuch, R. Curtmola, D. Holmer, H. Rubens, C. Nita-Rotaru. On the Survivability of Routing Protocols in Ad HocWireless Networks. In Security and Privacy for Emerging Areas in Communications Networks (SecureComm), Aug. 2005.
    • B. Awerbuch, R. Curtmola, D. Holmer, H. Rubens, C. Nita-Rotaru. On the Survivability of Routing Protocols in Ad HocWireless Networks. In Security and Privacy for Emerging Areas in Communications Networks (SecureComm), Aug. 2005.
  • 16
    • 33751113939 scopus 로고    scopus 로고
    • G. Das, M. Fazio, M. Villari, A. Puliafito. Vulnerabilities of Internet Access Mechanisms from Mobile Ad Hoc Networks. In International Conference on Advanced Information Networking and Applications (AINA), Apr. 2006.
    • G. Das, M. Fazio, M. Villari, A. Puliafito. Vulnerabilities of Internet Access Mechanisms from Mobile Ad Hoc Networks. In International Conference on Advanced Information Networking and Applications (AINA), Apr. 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.