메뉴 건너뛰기




Volumn , Issue , 2007, Pages 243-256

Countering false accusations and collusion in the detection of in-band wormholecombining dot belows

Author keywords

[No Author keywords available]

Indexed keywords

BYZANTINE-FAULT TOLERANCE; COMPUTER SECURITY APPLICATIONS; COOPERATIVE INTRUSION DETECTION; IN-BAND; INTRUSION DETECTION SYSTEM; NETWORK INTRUSIONS; NETWORK TOPOLOGIES; TEST BEDS; TEST RESULTS; VOTING ALGORITHM;

EID: 48649098942     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2007.41     Document Type: Conference Paper
Times cited : (8)

References (25)
  • 1
    • 27544460639 scopus 로고    scopus 로고
    • Mitigating Byzantine Attacks in Ad Hoc Wireless Networks
    • Technical Report Version 1March, Department of Computer Science, Johns Hopkins University
    • B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "Mitigating Byzantine Attacks in Ad Hoc Wireless Networks", Technical Report Version 1March 2004, Department of Computer Science, Johns Hopkins University.
    • (2004)
    • Awerbuch, B.1    Curtmola, R.2    Holmer, D.3    Nita-Rotaru, C.4    Rubens, H.5
  • 5
    • 14844335451 scopus 로고    scopus 로고
    • Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks
    • Technical Report IC/2003/31, EPFL-DI-ICA
    • S. Buchegger, J. Le Boudec, "Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks", Technical Report IC/2003/31, EPFL-DI-ICA (2003).
    • (2003)
    • Buchegger, S.1    Le Boudec, J.2
  • 6
    • 48049122172 scopus 로고    scopus 로고
    • J. Baras, S. Radosavac, G. Theodorakopoulos, D. Sterne, P. Budulas and R. Gopaul, Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR, MILCOM 2007, Orlando, FL, October 2007.
    • J. Baras, S. Radosavac, G. Theodorakopoulos, D. Sterne, P. Budulas and R. Gopaul, "Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR", MILCOM 2007, Orlando, FL, October 2007.
  • 9
    • 0041973497 scopus 로고    scopus 로고
    • Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
    • Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks", Proceedings of IEEE Infocomm 2003.
    • (2003) Proceedings of IEEE Infocomm
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 10
    • 35148886678 scopus 로고    scopus 로고
    • Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis
    • Washington, DC
    • M. Gorlatova, P. Mason, M. Wang, L. Lamont, R. Liscano, "Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis", MILCOM 2006, October 2006, Washington, DC.
    • (2006) MILCOM 2006, October
    • Gorlatova, M.1    Mason, P.2    Wang, M.3    Lamont, L.4    Liscano, R.5
  • 12
    • 34249341133 scopus 로고    scopus 로고
    • An Intrusion Detection System for Suburban Ad-hoc Networks
    • Nov, Melbourne Australia
    • Islam, M.M. Pose, R. Kopp, C. "An Intrusion Detection System for Suburban Ad-hoc Networks" TENCON 2005 2005 IEEE Region 10, Nov. 2005, Melbourne Australia.
    • (2005) TENCON 2005 2005 IEEE Region , vol.10
    • Islam, M.M.1    Pose, R.2    Kopp, C.3
  • 21
    • 48649096421 scopus 로고    scopus 로고
    • Optimized Link State Routing (OLSR), IETF RFC 3626, T. Clausen, P. Jacquet, Ed., October 2003.
    • "Optimized Link State Routing (OLSR)", IETF RFC 3626, T. Clausen, P. Jacquet, Ed., October 2003.
  • 22
    • 48649090215 scopus 로고    scopus 로고
    • OLSR.org, http://www.olsr.org.
    • OLSR.org


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.