메뉴 건너뛰기




Volumn , Issue , 2007, Pages 209-214

A novel gray hole attack detection scheme for mobile ad-hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

AGGREGATE SIGNATURES; ATTACK DETECTION; DATA PACKETS; DENIAL OF SERVICE (DOS) ATTACKS; DIAGNOSIS ALGORITHMS; DOS ATTACKS; DYNAMIC SOURCE ROUTING (DSR) PROTOCOLS; INTERNATIONAL CONFERENCES; MALICIOUS NODES; MOBILE AD-HOC NETWORK (MANET); NETWORK INFRASTRUCTURES; NETWORK MODELLING; PACKET DELIVERY; PACKET DROPPING; PACKET OVERHEAD; PARALLEL COMPUTING; SIMULATION RESULTS;

EID: 47849122028     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNPCW.2007.4351486     Document Type: Conference Paper
Times cited : (69)

References (17)
  • 1
    • 47849122924 scopus 로고    scopus 로고
    • IETF MANET work group
    • IETF MANET work group. http://www.ietf.org/html.charters/manet-charter. html
  • 2
    • 0032621035 scopus 로고    scopus 로고
    • A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
    • April
    • Elizabeth M. Royer, Chai-Keong Toh. "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks". IEEE Personal Communications, Vol. 6, No. 2, pp. 46-55, April 1999.
    • (1999) IEEE Personal Communications , vol.6 , Issue.2 , pp. 46-55
    • Elizabeth, M.1    Royer, C.-K.T.2
  • 3
    • 0742294233 scopus 로고    scopus 로고
    • Mobile Ad hoc Networking: Imperatives and Challenges
    • I Chlamtac, M Conti, et al. "Mobile Ad hoc Networking: Imperatives and Challenges". Ad hoc Net works, 2003, 1(1): 13-64.
    • (2003) Ad hoc Net works , vol.1 , Issue.1 , pp. 13-64
    • Chlamtac, I.1    Conti, M.2
  • 4
    • 3042647758 scopus 로고    scopus 로고
    • A Survey of Secure Wireless Ad Hoc Routing
    • May
    • YC Hu and A. Perrig. "A Survey of Secure Wireless Ad Hoc Routing". In IEEE Security and Privacy, vol. 2(3), pp. 28 - 39, May 2004.
    • (2004) In IEEE Security and Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.C.1    Perrig, A.2
  • 7
    • 15244358870 scopus 로고    scopus 로고
    • Resisting Malicious Packet Dropping. In Wireless Ad Hoc Networks
    • Oct
    • M. Just, E. Kranakis, and T. Wan. "Resisting Malicious Packet Dropping. In Wireless Ad Hoc Networks." In Proc. ADHOC-NOW, Oct. 2003.
    • (2003) Proc. ADHOC-NOW
    • Just, M.1    Kranakis, E.2    Wan, T.3
  • 8
    • 24144482746 scopus 로고    scopus 로고
    • Q. Huang, IC Avramopoulos, H Kobayashi, B. Liu. Secure data forwarding in wireless ad hoc networks. Communications, 2005. ICC 2005. 2005 IEEE International Conference on, 5 (2005), pp. 3525-3531 5.
    • Q. Huang, IC Avramopoulos, H Kobayashi, B. Liu. "Secure data forwarding in wireless ad hoc networks". Communications, 2005. ICC 2005. 2005 IEEE International Conference on, Vol. 5 (2005), pp. 3525-3531 Vol. 5.
  • 11
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The dynamic source routing protocol for multiple wireless ad hoc networks
    • Perkins C, Ed, Addison-Wesley
    • Johnson DB, Maltz DA, Broch J. "DSR: The dynamic source routing protocol for multiple wireless ad hoc networks". In: Perkins C, Ed, Ad Hoc Networking. Addison-Wesley,2001. 139-172.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2    Broch, J.3
  • 12
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
    • Advances in Cryptology- EUROCRYPT'03:, Berlin: Springer-Veralg
    • D. Boneh, C. Gentry, B. Lynn, H. Shacham. "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps". Advances in Cryptology- EUROCRYPT'03: LNCS 2656. Berlin: Springer-Veralg, 2003. 416-432.
    • (2003) LNCS , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 13
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • San Francesco, CA, April
    • S. Zhong, J. Chen, and Y. R. Yang. "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks". In Proceedings of IEEE INFOCOM '03, San Francesco, CA, April 2003.
    • (2003) Proceedings of IEEE INFOCOM '03
    • Zhong, S.1    Chen, J.2    Yang, Y.R.3
  • 14
    • 47849089384 scopus 로고    scopus 로고
    • P. Michiardi and R. Molva. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In CMS'2002, Commnunication and Multimedia Security 2002 Conference, September 26-27, 2002, Portoroz, Slovenia
    • P. Michiardi and R. Molva. "CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks". In CMS'2002, Commnunication and Multimedia Security 2002 Conference, September 26-27, 2002, Portoroz, Slovenia
  • 15
    • 47849087354 scopus 로고    scopus 로고
    • /Also published in the book: Advanced Commnunications and Multimedia Secuirity /Borka Jermnan-Blazic & Tomnaz Klobiucar, editors, Kluwer Academic Publishers, ISBN 1-4020- 7206-6, Aulgust 2002, 320 pp, May 2005.
    • /Also published in the book: Advanced Commnunications and Multimedia Secuirity /Borka Jermnan-Blazic & Tomnaz Klobiucar, editors, Kluwer Academic Publishers, ISBN 1-4020- 7206-6, Aulgust 2002, 320 pp, May 2005.
  • 16
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Boyd C, ed, Berlin, Heidelberg: Springer-Verlag
    • Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In: Boyd C, ed. Advances in Cryptology - Asiacrypt 2001. Berlin, Heidelberg: Springer-Verlag, 2001. 514-532.
    • (2001) Advances in Cryptology - Asiacrypt 2001 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.