메뉴 건너뛰기




Volumn 6, Issue 7, 2008, Pages 1151-1167

Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks

Author keywords

Blackmail attack; Friend mechanism; Intrusion detection system; MANET

Indexed keywords

ACCESS CONTROL; AD HOC NETWORKS; ALARM SYSTEMS; COMPUTER CRIME; COMPUTERS; INFORMATION TECHNOLOGY; INTRUSION DETECTION; MECHANISMS; METROPOLITAN AREA NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SENSORS; SIGNAL DETECTION; TELECOMMUNICATION LINKS; TELECOMMUNICATION NETWORKS; WEIGHT CONTROL; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 46449126324     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2007.11.004     Document Type: Article
Times cited : (41)

References (23)
  • 1
    • 46449120037 scopus 로고    scopus 로고
    • F.Y. Loo. Ad hoc network: prospects and challenges. Graduate School Research Paper (Rinkou), Department of Information and Communication Engineering, University of Tokyo, 2004.
    • F.Y. Loo. Ad hoc network: prospects and challenges. Graduate School Research Paper (Rinkou), Department of Information and Communication Engineering, University of Tokyo, 2004.
  • 2
    • 46449104877 scopus 로고    scopus 로고
    • Security lifecycle - managing the threat
    • King M. Security lifecycle - managing the threat. GSEC Practical 1 (2002)
    • (2002) GSEC Practical , vol.1
    • King, M.1
  • 3
    • 46449094603 scopus 로고    scopus 로고
    • A. Burg. Ad hoc networks specific attacks Seminar Paper. Seminar Ad Hoc Networking: concept, applications, and security, Technische Universität München, Institut für Informatik, 2003.
    • A. Burg. Ad hoc networks specific attacks Seminar Paper. Seminar Ad Hoc Networking: concept, applications, and security, Technische Universität München, Institut für Informatik, 2003.
  • 4
    • 33745197327 scopus 로고    scopus 로고
    • LHAP: A lightweight network access control protocol for ad-hoc networks
    • Zhu S., Xu S., Setia S., and Jajodia S. LHAP: A lightweight network access control protocol for ad-hoc networks. Elsevier Ad Hoc Networks Journal 4 5 (2006) 567-585
    • (2006) Elsevier Ad Hoc Networks Journal , vol.4 , Issue.5 , pp. 567-585
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4
  • 5
    • 46449130616 scopus 로고    scopus 로고
    • D. Balfanz, D. Smetters, P. Stewart, H. Wong, Talking to strangers - authentication in ad hoc wireless networks. in: Proceedings of the 9th Annual Network and Distributed System Security Symposium (NDSS), San Diego, California, 2002.
    • D. Balfanz, D. Smetters, P. Stewart, H. Wong, Talking to strangers - authentication in ad hoc wireless networks. in: Proceedings of the 9th Annual Network and Distributed System Security Symposium (NDSS), San Diego, California, 2002.
  • 6
    • 84947251443 scopus 로고    scopus 로고
    • F. Stajano, R. Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks. in: Proceedings of the 7th International Workshop on Security Protocols, LNCS, vol. 1796, 1999, pp. 172-194.
    • F. Stajano, R. Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks. in: Proceedings of the 7th International Workshop on Security Protocols, LNCS, vol. 1796, 1999, pp. 172-194.
  • 7
    • 0034590150 scopus 로고    scopus 로고
    • L. Venkatraman, D.P. Agrawal, A novel authentication scheme for ad hoc networks. in: IEEE Wireless Communications and Networking Conference (WCNC 2000), vol. 3, 2000, pp. 1268-1273.
    • L. Venkatraman, D.P. Agrawal, A novel authentication scheme for ad hoc networks. in: IEEE Wireless Communications and Networking Conference (WCNC 2000), vol. 3, 2000, pp. 1268-1273.
  • 8
    • 84904904836 scopus 로고    scopus 로고
    • K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.B. Royer, A secure routing protocol for ad hoc networks. in: Proceedings of the 2002 IEEE International Conference on Network Protocols (ICNP), 2002, pp. 78-89.
    • K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.B. Royer, A secure routing protocol for ad hoc networks. in: Proceedings of the 2002 IEEE International Conference on Network Protocols (ICNP), 2002, pp. 78-89.
  • 9
    • 84948986047 scopus 로고    scopus 로고
    • S. Ghazizadeh, O. Ilghami, E. Sirin, F. Yaman, Security-aware adaptive dynamic source routing protocol. in: Proceedings of the 27th Conference on Local Computer Networks, 2002, pp. 751-760.
    • S. Ghazizadeh, O. Ilghami, E. Sirin, F. Yaman, Security-aware adaptive dynamic source routing protocol. in: Proceedings of the 27th Conference on Local Computer Networks, 2002, pp. 751-760.
  • 10
    • 0042933944 scopus 로고    scopus 로고
    • S. Zhong, Y.R. Yang, J. Chen, Sprite: a simple, cheatproof, credit-based system for mobile ad hoc networks. in: Proceedings of the IEEE INFOCOM'03, San Francisco, 2003, pp. 1987-1997.
    • S. Zhong, Y.R. Yang, J. Chen, Sprite: a simple, cheatproof, credit-based system for mobile ad hoc networks. in: Proceedings of the IEEE INFOCOM'03, San Francisco, 2003, pp. 1987-1997.
  • 11
    • 46449132019 scopus 로고    scopus 로고
    • L. Buttyan, J.-P. Hubaux, Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical Report DSC/2001/001. Department of Communication Systems, Swiss Federal Institute of Technology - Lausanne, 2001.
    • L. Buttyan, J.-P. Hubaux, Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical Report DSC/2001/001. Department of Communication Systems, Swiss Federal Institute of Technology - Lausanne, 2001.
  • 12
    • 46449126549 scopus 로고    scopus 로고
    • P. Albers, O. Camp, J.-M. Percher, B. Jouga, L. Mé, R. Puttini, Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. in: Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002), 2002, pp. 1-12.
    • P. Albers, O. Camp, J.-M. Percher, B. Jouga, L. Mé, R. Puttini, Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. in: Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002), 2002, pp. 1-12.
  • 13
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Zhang Y., Lee W., and Huang Y.-A. Intrusion detection techniques for mobile wireless networks. Wireless Network 9 5 (2003) 545-556
    • (2003) Wireless Network , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3
  • 14
    • 46449109716 scopus 로고    scopus 로고
    • P. Kazienko, P. Dorosz, Intrusion detection systems (IDS) Part 2 - Classification; methods; techniques. , 2004.
    • P. Kazienko, P. Dorosz, Intrusion detection systems (IDS) Part 2 - Classification; methods; techniques. , 2004.
  • 15
    • 0036980295 scopus 로고    scopus 로고
    • H. Yang, X. Meng, S. Lu, Self-organized network-layer security in mobile ad hoc networks. in: ACM MOBICOM Wireless Security Workshop (WiSe'02), Atlanta, 2002, pp. 11-20.
    • H. Yang, X. Meng, S. Lu, Self-organized network-layer security in mobile ad hoc networks. in: ACM MOBICOM Wireless Security Workshop (WiSe'02), Atlanta, 2002, pp. 11-20.
  • 16
    • 0036986441 scopus 로고    scopus 로고
    • B. Awerbuch, D. Holmer, C.N. Rotaru, H. Rubens, An on-demand secure routing protocol resilient to byzantine failures. in ACM Workshop on Wireless Security (WiSe'02), Atlanta, Georgia, 2002, pp. 21-30.
    • B. Awerbuch, D. Holmer, C.N. Rotaru, H. Rubens, An on-demand secure routing protocol resilient to byzantine failures. in ACM Workshop on Wireless Security (WiSe'02), Atlanta, Georgia, 2002, pp. 21-30.
  • 17
    • 0035178273 scopus 로고    scopus 로고
    • S. Bhargava, D.P. Agrawal, Security nhancements in AODV protocol for wireless ad hoc networks. in: Vehicular Technology Conference, Atlantic City, 2001, pp. 2143-2147.
    • S. Bhargava, D.P. Agrawal, Security nhancements in AODV protocol for wireless ad hoc networks. in: Vehicular Technology Conference, Atlantic City, 2001, pp. 2143-2147.
  • 18
    • 46449118863 scopus 로고    scopus 로고
    • H. Debar, M. Dacier, A.Wespi, Towards taxonomy of intrusion detection systems. IBM Zurich Research Laboratory, Ruschlikon, Switzerland, 1998.
    • H. Debar, M. Dacier, A.Wespi, Towards taxonomy of intrusion detection systems. IBM Zurich Research Laboratory, Ruschlikon, Switzerland, 1998.
  • 19
    • 46449100683 scopus 로고    scopus 로고
    • S.T. King, Z.M. Mao, P.M. Chen, CIDS: Causality Based Intrusion Detection System. . Technical Report, CSE-TR-493-04. University of Michigan, 2004.
    • S.T. King, Z.M. Mao, P.M. Chen, CIDS: Causality Based Intrusion Detection System. . Technical Report, CSE-TR-493-04. University of Michigan, 2004.
  • 20
    • 84950162203 scopus 로고    scopus 로고
    • O. Kachirski, R. Gupta, Intrusion detection using mobile agents in wireless ad hoc networks. in: IEEE Workshop on Knowledge Media Networking (KMN'02), Kyoto, Japan, 2002, pp. 153-160.
    • O. Kachirski, R. Gupta, Intrusion detection using mobile agents in wireless ad hoc networks. in: IEEE Workshop on Knowledge Media Networking (KMN'02), Kyoto, Japan, 2002, pp. 153-160.
  • 21
    • 46449086721 scopus 로고    scopus 로고
    • Monarch Project. Rice Monarch Project Extensions to ns-2. , November, 2000.
    • Monarch Project. Rice Monarch Project Extensions to ns-2. , November, 2000.
  • 22
    • 46449113566 scopus 로고    scopus 로고
    • Britsocat. (1995). Number of close friends. .
    • Britsocat. (1995). Number of close friends. .
  • 23
    • 46449128798 scopus 로고    scopus 로고
    • Friends like these: the relationships that shape our lives
    • Frean A. Friends like these: the relationships that shape our lives. ESRC Society Today - The Edge 13 (2003) 8-10
    • (2003) ESRC Society Today - The Edge , Issue.13 , pp. 8-10
    • Frean, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.