메뉴 건너뛰기




Volumn , Issue , 2008, Pages 636-641

Intrusion detection for wormhole attacks in ad hoc networks a survey and a proposed decentralized scheme

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION; COMPUTER CRIME; INTRUSION DETECTION; SURVEYS; TELECOMMUNICATION NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 49049107970     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.177     Document Type: Conference Paper
Times cited : (11)

References (18)
  • 2
    • 0004024262 scopus 로고    scopus 로고
    • The Ad hoc On-Demand Distance Vector Protocol
    • C. E. Perkins, editor, Addison-Wesley
    • C. E. Perkins and E. M. Royer. The Ad hoc On-Demand Distance Vector Protocol. In C. E. Perkins, editor, Ad hoc Networking, Addison-Wesley, 2000, pp. 173-219.
    • (2000) Ad hoc Networking , pp. 173-219
    • Perkins, C.E.1    Royer, E.M.2
  • 6
    • 27544468419 scopus 로고    scopus 로고
    • I. Khalil, S. Bagchi, N. B. Shroff, LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks, dsn, pp. 612-621, 2005 International Conference on Dependable Systems and Networks (DSN'05), 2005.
    • I. Khalil, S. Bagchi, N. B. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks", dsn, pp. 612-621, 2005 International Conference on Dependable Systems and Networks (DSN'05), 2005.
  • 8
    • 49049093113 scopus 로고    scopus 로고
    • W. Ribeiro, P. Junior, T. Figueiredo, H. Wong, and A. Loureiro. Malicious Node Detection in Wireless Sensor Networks, ipdps, p. 24b, 18th International Parallel and Distributed Processing Symposium (IPDPS'04) - Papers, 2004.
    • W. Ribeiro, P. Junior, T. Figueiredo, H. Wong, and A. Loureiro. "Malicious Node Detection in Wireless Sensor Networks", ipdps, p. 24b, 18th International Parallel and Distributed Processing Symposium (IPDPS'04) - Papers, 2004.
  • 9
    • 34247527847 scopus 로고    scopus 로고
    • X. Wang, Intrusion Detection Techniques in Wireless Ad Hoc Networks, compsac, pp. 347-349, 30th Annual International Computer Software and Applications Conference COMPSAC'06, 2006
    • X. Wang, "Intrusion Detection Techniques in Wireless Ad Hoc Networks", compsac, pp. 347-349, 30th Annual International Computer Software and Applications Conference (COMPSAC'06), 2006.
  • 10
    • 37349001578 scopus 로고    scopus 로고
    • X. Wang, and J. Wong, An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks, compsac, pp. 39-48, 31st Annual International Computer Software and Applications Conference, 1-COMPSAC 2007, 2007
    • X. Wang, and J. Wong, "An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks," compsac, pp. 39-48, 31st Annual International Computer Software and Applications Conference - Vol. 1-(COMPSAC 2007), 2007.
  • 12
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • ISSN:1022-0038, pp
    • R. Poovendran, L., Lazos, "A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks", in Wireless Networks, Volume 13, Issue 1, ISSN:1022-0038, pp. 27-59, 2007.
    • (2007) Wireless Networks , vol.13 , Issue.1 , pp. 27-59
    • Poovendran, R.1    Lazos, L.2
  • 13
    • 33746301431 scopus 로고    scopus 로고
    • N. Song, L. Qian, and X. Li. Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach, ipdps, p. 289a, 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17, 2005.
    • N. Song, L. Qian, and X. Li. "Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach", ipdps, p. 289a, 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17, 2005.
  • 16
    • 49049110583 scopus 로고    scopus 로고
    • Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection
    • M. Azer, S. El-Kassas,and M. El-Soudani, "Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection,", SECRYPT 2006, pp. 63-68.
    • (2006) SECRYPT , pp. 63-68
    • Azer, M.1    El-Kassas, S.2    El-Soudani, M.3
  • 17
    • 33745657261 scopus 로고    scopus 로고
    • A Specification-Based Intrusion Detection Model for OLSR
    • C. Tseng, T. Song, P. Balasubramanyam, C. Ko, K. Levitt, "A Specification-Based Intrusion Detection Model for OLSR", RAID 2005, pp. 330-350.
    • (2005) RAID , pp. 330-350
    • Tseng, C.1    Song, T.2    Balasubramanyam, P.3    Ko, C.4    Levitt, K.5
  • 18
    • 33646906812 scopus 로고    scopus 로고
    • Ad Hoc Innovation: Distributed Decision Making in Ad Hoc Networks
    • April
    • T. Forde, L. Doyle, and D. O'Mahony, "Ad Hoc Innovation: Distributed Decision Making in Ad Hoc Networks", IEEE Communications Magazine, vol. 44, no. 4, April 2006.
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4
    • Forde, T.1    Doyle, L.2    O'Mahony, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.