메뉴 건너뛰기




Volumn 6, Issue 3, 2008, Pages 363-379

Defending against cache consistency attacks in wireless ad hoc networks

Author keywords

Ad hoc network; Authentication; Caching; Damage recovery; Intrusion detection

Indexed keywords

AUTHENTICATION; BANDWIDTH COMPRESSION; CACHE MEMORY; COMPUTER SIMULATION; DATA ACQUISITION; INTRUSION DETECTION;

EID: 37549010749     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2007.02.005     Document Type: Article
Times cited : (3)

References (20)
  • 1
    • 0033892676 scopus 로고    scopus 로고
    • Performance comparison of two on-demand routing protocols for ad hoc networks
    • Das S., Perkins C., and Royer E. Performance comparison of two on-demand routing protocols for ad hoc networks. IEEE Infocom (2000) 3-12
    • (2000) IEEE Infocom , pp. 3-12
    • Das, S.1    Perkins, C.2    Royer, E.3
  • 2
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Johnson D., and Maltz D. Dynamic source routing in ad hoc wireless networks. Mobile Computing, Kluwer (1996) 153-181
    • (1996) Mobile Computing, Kluwer , pp. 153-181
    • Johnson, D.1    Maltz, D.2
  • 3
    • 85116486060 scopus 로고    scopus 로고
    • Location-aided routing in mobile ad hoc networks
    • Ko Y., and Vaidya N. Location-aided routing in mobile ad hoc networks. ACM Mobicom (1998) 66-75
    • (1998) ACM Mobicom , pp. 66-75
    • Ko, Y.1    Vaidya, N.2
  • 4
    • 0036924499 scopus 로고    scopus 로고
    • On-demand multicast routing protocol in multihop wireless mobile networks
    • Lee S., Su W., and Gerla M. On-demand multicast routing protocol in multihop wireless mobile networks. ACM/Kluwer Mobile Networks and Applications (MONET) 7 6 (2002) 441-453
    • (2002) ACM/Kluwer Mobile Networks and Applications (MONET) , vol.7 , Issue.6 , pp. 441-453
    • Lee, S.1    Su, W.2    Gerla, M.3
  • 5
    • 0032046534 scopus 로고    scopus 로고
    • Maintaining strong cache consistency in the World Wide Web
    • Cao P., and Liu C. Maintaining strong cache consistency in the World Wide Web. IEEE Transactions on Computers (1998) 445-457
    • (1998) IEEE Transactions on Computers , pp. 445-457
    • Cao, P.1    Liu, C.2
  • 6
    • 0028447376 scopus 로고
    • Sleepers and workaholics: caching strategies for mobile environments
    • Barbara D., and Imielinski T. Sleepers and workaholics: caching strategies for mobile environments. ACM SIGMOD (1994) 1-12
    • (1994) ACM SIGMOD , pp. 1-12
    • Barbara, D.1    Imielinski, T.2
  • 7
    • 0034543872 scopus 로고    scopus 로고
    • G. Cao, A scalable low-latency cache invalidation strategy for mobile environments, ACM Mobicom, 2000.
  • 8
    • 0035789229 scopus 로고    scopus 로고
    • The quest for security in mobile ad hoc networks
    • Hubaux H., Buttyan L., and Capkun S. The quest for security in mobile ad hoc networks. ACM MobiHoc (2001) 146-155
    • (2001) ACM MobiHoc , pp. 146-155
    • Hubaux, H.1    Buttyan, L.2    Capkun, S.3
  • 9
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L., and Haas Z. Securing ad hoc networks. IEEE Network 13 6 (1999) 24-30
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 10
    • 37549064152 scopus 로고    scopus 로고
    • K. Sanzgiri, B. Dahill, B. Levine, C. Shields, E. Belding-Royer, A secure routing protocol for ad hoc networks, in: IEEE Int'l Conf. on Network Protocols (ICNP), November 2002.
  • 11
    • 37549025590 scopus 로고    scopus 로고
    • Y. Hu, A. Perrig, D. Johnson, Ariadne: a secure on-demand routing protocol for wireless ad hoc networks, ACM Mobicom, September 2002.
  • 12
    • 0033690336 scopus 로고    scopus 로고
    • A. Perrig, R. Canetti, J. Tygar, D. Song, Efficient authentication and signing of multicast streams over lossy channels, in: IEEE Symposium on Security and Privacy, May 2000.
  • 13
    • 0041973497 scopus 로고    scopus 로고
    • Y. Hu, A. Perrig, D. Johnson, Packet leashes: a defense against wormhole attacks in wireless ad hoc networks, in: IEEE Infocom, April 2003.
  • 14
    • 85177500467 scopus 로고    scopus 로고
    • S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: ACM MobiCom, August 2000.
  • 15
    • 2442597363 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT Protocol: Cooperation Of Nodes Fairness In Dynamic Adhoc NeTworks
    • Buchegger S., and Boudec J.-Y. Performance analysis of the CONFIDANT Protocol: Cooperation Of Nodes Fairness In Dynamic Adhoc NeTworks. ACM Mobihoc (2002) 80-91
    • (2002) ACM Mobihoc , pp. 80-91
    • Buchegger, S.1    Boudec, J.-Y.2
  • 16
    • 0036980295 scopus 로고    scopus 로고
    • H. Yang, X. Meng, S. Lu, Self-organized network-layer security in mobile ad hoc networks, in: ACM Workshop on Wireless Security, August 2002.
  • 18
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • Zhang Y., and Lee W. Intrusion detection in wireless ad-hoc networks. ACM Mobicom Aug. (2000) 275-283
    • (2000) ACM Mobicom , Issue.Aug , pp. 275-283
    • Zhang, Y.1    Lee, W.2
  • 19
    • 37549062796 scopus 로고    scopus 로고
    • P. Kyasanur, N. Vaidya, Detection and handling of MAC layer misbehavior in wireless networks, Technical Report, UIUC, August 2002.
  • 20
    • 37549012352 scopus 로고    scopus 로고
    • The CMU Monarch Project, The CMU Monarch Projects Wireless and Mobility Extensions to ns. , October 1999.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.