메뉴 건너뛰기




Volumn , Issue , 2006, Pages 75-84

TrueLink: A practical countermeasure to the wormhole attack in wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

CLOCK SYNCHRONIZATIONS; COUNTERMEASURES (CM); INTERNATIONAL CONFERENCES; SPECIALIZED HARDWARE; TWO PHASES; VIRTUAL LINK; WIRELESS TRANSMISSIONS; WORM HOLE ATTACK;

EID: 46149096001     PISSN: 10921648     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNP.2006.320200     Document Type: Conference Paper
Times cited : (112)

References (24)
  • 1
    • 0041973497 scopus 로고    scopus 로고
    • Y. Hu, A. Perrig, and D. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks., in INFOCOM, 2003.
    • Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks.," in INFOCOM, 2003.
  • 5
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad-hoc wireless networks
    • Kluwer Academic
    • D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad-hoc wireless networks," in Mobile Computing. Kluwer Academic, 1996.
    • (1996) Mobile Computing
    • Johnson, D.B.1    Maltz, D.A.2
  • 6
    • 85031307530 scopus 로고
    • Highly dynamic destination-sequenced distance vector routing (dsdv) for mobile computeres
    • Sep
    • C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance vector routing (dsdv) for mobile computeres," in Proc. ACM SIGCOMM, Sep. 1994.
    • (1994) Proc. ACM SIGCOMM
    • Perkins, C.E.1    Bhagwat, P.2
  • 7
    • 0036986441 scopus 로고    scopus 로고
    • An on-demand secure routing protocol resilient to byzantine failures
    • B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An on-demand secure routing protocol resilient to byzantine failures," in WiSE '02, 2002.
    • (2002) WiSE '02
    • Awerbuch, B.1    Holmer, D.2    Nita-Rotaru, C.3    Rubens, H.4
  • 9
    • 27544468419 scopus 로고    scopus 로고
    • Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks
    • Issa Khalil, Saurabh Bagchi, and Ness B. Shroff, "Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks.," in DSN, 2005, pp. 612-621.
    • (2005) DSN , pp. 612-621
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3
  • 11
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y. Hu, A. Perrig, and D Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in ACM MobiCom, 2002.
    • (2002) ACM MobiCom
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 12
    • 84961572484 scopus 로고    scopus 로고
    • Sead: Secure efficient distance vector routing in mobile wireless ad hoc networks
    • Y. Hu, D. Johnson, and A. Perrig, "Sead: Secure efficient distance vector routing in mobile wireless ad hoc networks," in WMCSA '02, 2002.
    • (2002) WMCSA '02
    • Hu, Y.1    Johnson, D.2    Perrig, A.3
  • 14
    • 11244252132 scopus 로고    scopus 로고
    • Denial of service resilience in ad hoc networks
    • Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly, "Denial of service resilience in ad hoc networks," in MOBICOM, 2004.
    • (2004) MOBICOM
    • Aad, I.1    Hubaux, J.-P.2    Knightly, E.W.3
  • 17
    • 84977898401 scopus 로고    scopus 로고
    • Using directional antennas to prevent wormhole attacks
    • Lingxuan Hu and David Evans, "Using directional antennas to prevent wormhole attacks.," in NDSS, 2004.
    • (2004) NDSS
    • Hu, L.1    Evans, D.2
  • 18
    • 34548347881 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • Radha Poovendran and Loukas Lazos, "A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks," ACM Journal on Wireless Networks (WINET), 2005.
    • (2005) ACM Journal on Wireless Networks (WINET)
    • Poovendran, R.1    Lazos, L.2
  • 19
    • 46149123800 scopus 로고    scopus 로고
    • How does topology affect security in wireless network?
    • I. Broustis, M. Faloutsos, and S. Krishnamurthy, "How does topology affect security in wireless network?," in eSCo-Wi, 2006.
    • (2006) eSCo-Wi
    • Broustis, I.1    Faloutsos, M.2    Krishnamurthy, S.3
  • 20
    • 1542287664 scopus 로고    scopus 로고
    • Secure data transmission in mobile ad hoc networks
    • New York, NY, USA, ACM Press
    • Panagiotis Papadimitratos and Zygmunt J. Haas, "Secure data transmission in mobile ad hoc networks," in WiSe '03, New York, NY, USA, 2003, pp. 41-50, ACM Press.
    • (2003) WiSe '03 , pp. 41-50
    • Papadimitratos, P.1    Haas, Z.J.2
  • 22
    • 46149112252 scopus 로고    scopus 로고
    • Private correspondence
    • Mart Molle, "Private correspondence," 2005.
    • (2005)
    • Molle, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.