메뉴 건너뛰기




Volumn 1, Issue , 2007, Pages 39-46

An end-to-end detection of wormhole attack in wireless ad-hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

END-TO-END WORMHOLE DETECTION; WORMHOLE ATTACK;

EID: 37349001578     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2007.63     Document Type: Conference Paper
Times cited : (71)

References (25)
  • 1
    • 0842326315 scopus 로고    scopus 로고
    • Bootstrapping security associations for routing in mobile ad-hoc networks
    • 2002-44, May
    • R. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh, Bootstrapping security associations for routing in mobile ad-hoc networks. Technical Report TR 2002-44, May 2002.
    • (2002) Technical Report TR
    • Bobba, R.1    Eschenauer, L.2    Gligor, V.3    Arbaugh, W.4
  • 6
    • 34147120474 scopus 로고    scopus 로고
    • E. W. dijkstra. A note on two problems in connection with graphs. Numerische Mathematik, 1:269-271, 1959.
    • E. W. dijkstra. A note on two problems in connection with graphs. Numerische Mathematik, 1:269-271, 1959.
  • 10
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Sept
    • Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In ACM MobiCom 2002, Sept. 2002.
    • (2002) ACM MobiCom 2002
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 12
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks, In Proceedings of MobiCom, 2002.
    • (2002) Proceedings of MobiCom
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 14
    • 28244448922 scopus 로고    scopus 로고
    • The dynamic source routing protocol for mobile ad hoc networks (DSR)
    • D. B. Johnson, D. A. Maltz, and Y. Hu. The dynamic source routing protocol for mobile ad hoc networks (DSR). IETF MANET Internet Draft, 2003.
    • (2003) IETF MANET Internet Draft
    • Johnson, D.B.1    Maltz, D.A.2    Hu, Y.3
  • 15
    • 27544468419 scopus 로고    scopus 로고
    • Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks
    • I. Khalil, S. Bagchi, and N. B. Shroff. Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks. In DSN, pages 612-621, 2005.
    • (2005) DSN , pp. 612-621
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3
  • 16
    • 0142018657 scopus 로고    scopus 로고
    • Political and economic dimensions of global navigation satellite system (gnss)
    • M. S. Khan. Political and economic dimensions of global navigation satellite system (gnss). In Proc. of IEEE Aerospace Conf., page 1271C1276, 2001.
    • (2001) Proc. of IEEE Aerospace Conf , vol.C1276 , pp. 1271
    • Khan, M.S.1
  • 18
    • 0020830063 scopus 로고
    • NAVSTAR: Global positioning systemlten years later
    • B. Parkinson and S. Gilbert. NAVSTAR: Global positioning systemlten years later. In Proc. IEEE, volume 71, page 1177C1186, 1983.
    • (1983) Proc. IEEE , vol.71 , Issue.C1186 , pp. 1177
    • Parkinson, B.1    Gilbert, S.2
  • 20
    • 37349060385 scopus 로고    scopus 로고
    • Detecting and evading wormholes in mobile ad-hoc wireless networks
    • Sept
    • A. A. Pirzada and C. McDonald. Detecting and evading wormholes in mobile ad-hoc wireless networks. International Journal of Network Security, 3(2):191C202, Sept. 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.2 C202 , pp. 191
    • Pirzada, A.A.1    McDonald, C.2
  • 21
    • 34548347881 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • R. Poovendran and L. Lazos. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM journal on Wireless Networks (W/NET), 2005.
    • (2005) ACM journal on Wireless Networks (W/NET)
    • Poovendran, R.1    Lazos, L.2
  • 22
    • 24944567810 scopus 로고    scopus 로고
    • Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path
    • Mar
    • L. Qian, N. Song, and X. Li. Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path. Wireless Communications and Networking Conference, 4:2106 - 2111, Mar. 2005.
    • (2005) Wireless Communications and Networking Conference , vol.4 , pp. 2106-2111
    • Qian, L.1    Song, N.2    Li, X.3
  • 23
    • 0030258879 scopus 로고    scopus 로고
    • Position location using wireless communications on highways of the future
    • Oct
    • T. Rappaport, J. Reed, and B.Woerner. Position location using wireless communications on highways of the future. IEEE Commun. Mag., 34(10):33C41, Oct. 1996.
    • (1996) IEEE Commun. Mag , vol.34 , Issue.10 C41 , pp. 33
    • Rappaport, T.1    Reed, J.2    Woerner, B.3
  • 25
    • 23344439730 scopus 로고    scopus 로고
    • Novel self-configurable positioning technique for multi-hop wireless networks
    • June
    • H. Wu, C. Wang, and N.-E Tzeng. Novel self-configurable positioning technique for multi-hop wireless networks. IEEE/ACM Transactions on Networking, 13(3):609-621, June 2005.
    • (2005) IEEE/ACM Transactions on Networking , vol.13 , Issue.3 , pp. 609-621
    • Wu, H.1    Wang, C.2    Tzeng, N.-E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.