메뉴 건너뛰기




Volumn , Issue , 2006, Pages

A study of on-off attack models for wireless ad hoc networks

Author keywords

Modeling; Security; Simulation; Wireless ad hoc networking

Indexed keywords

INTERNET; LOCAL AREA NETWORKS; NETWORK PROTOCOLS; QUALITY OF SERVICE; RISK ANALYSIS; RISK ASSESSMENT; ROUTING PROTOCOLS; SAFETY FACTOR; STANDARDS; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 46149125563     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WOACN.2006.337180     Document Type: Conference Paper
Times cited : (29)

References (12)
  • 1
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May-June
    • Y.-C. Hu and A. Perrig, "A survey of secure wireless ad hoc routing," IEEE Security & Privacy Magazine, vol. 2, no. 3, pp. 28-39, May-June 2004.
    • (2004) IEEE Security & Privacy Magazine , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.-C.1    Perrig, A.2
  • 4
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • October
    • A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35. no. 10, pp. 54-62, October 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.2
  • 5
    • 46149087957 scopus 로고    scopus 로고
    • C. E. Perkins, E. M. Belding-Royer, and S. R. Das, Ad hoc on-demand distance vector (aodv) routing, http://www.ietf.org/rfc/rfc3561.txt, July 2003, [Accessed May 15, 2006].
    • C. E. Perkins, E. M. Belding-Royer, and S. R. Das, "Ad hoc on-demand distance vector (aodv) routing," http://www.ietf.org/rfc/rfc3561.txt, July 2003, [Accessed May 15, 2006].
  • 7
    • 46149110958 scopus 로고    scopus 로고
    • Private communication
    • C. Elliott and S. Boswell, Private communication, 2002.
    • (2002)
    • Elliott, C.1    Boswell, S.2
  • 8
    • 3042542420 scopus 로고    scopus 로고
    • Simulation based analysis of security exposures in mobile ad hoc networks
    • Florence, Italy: EUREL-Convention of National Societies of Electrical Engineers of Europe, February
    • P. Michiardi and R. Molva. "Simulation based analysis of security exposures in mobile ad hoc networks," in Proceedings of the European Wireless 2002 Conference (EW2002). Florence, Italy: EUREL-Convention of National Societies of Electrical Engineers of Europe, February 2002.
    • (2002) Proceedings of the European Wireless 2002 Conference (EW2002)
    • Michiardi, P.1    Molva, R.2
  • 9
    • 46149114096 scopus 로고    scopus 로고
    • D. B. Johnson, D. A. Maltz, and Y.-C. H. and Jorjeta G. Jetcheva, The dynamic source routing protocol for mobile ad hoc networks (dsr). http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-10.txt, July 2004, [Accessed May 15, 2006].
    • D. B. Johnson, D. A. Maltz, and Y.-C. H. and Jorjeta G. Jetcheva, "The dynamic source routing protocol for mobile ad hoc networks (dsr)." http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-10.txt, July 2004, [Accessed May 15, 2006].
  • 10
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • October
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 3, no. 10, pp. 54-62, October 2002.
    • (2002) IEEE Computer , vol.3 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 11
    • 33750310807 scopus 로고    scopus 로고
    • F. B. Abdesslem, M. D. d. A. L. Iannone, K. Kabassanov, and S. Fdida, On the feasibility of power control in current IEEE802.11 devices, in Proceedings of the Second IEEE Percom Workshop on Pervasive Wireless Networking, March 2006, pp. 468 - 473.
    • F. B. Abdesslem, M. D. d. A. L. Iannone, K. Kabassanov, and S. Fdida, "On the feasibility of power control in current IEEE802.11 devices," in Proceedings of the Second IEEE Percom Workshop on Pervasive Wireless Networking, March 2006, pp. 468 - 473.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.