메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Detecting the sybil attack in mobile Ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

CLOSE PROXIMITY; DETECTION MECHANISM; MAC LEVEL; MOBILE AD-HOC NETWORKS; SECURITY SERVICES; SYBIL ATTACKS;

EID: 50049120615     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECCOMW.2006.359558     Document Type: Conference Paper
Times cited : (86)

References (32)
  • 12
    • 3042647758 scopus 로고    scopus 로고
    • Y. Hu and A. Perrig. A Survey of Secure Wireless Ad hoc Routing. IEEE Security & Privacy, 2(3):28-39, May/June 2004.
    • Y. Hu and A. Perrig. A Survey of Secure Wireless Ad hoc Routing. IEEE Security & Privacy, 2(3):28-39, May/June 2004.
  • 14
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic Source Routing in Ad hoc Wireless Networks
    • Kluwer Academic Publishers
    • D. Johnson and D. Maltz. Dynamic Source Routing in Ad hoc Wireless Networks. In Mobile Computing, volume 353. Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , vol.353
    • Johnson, D.1    Maltz, D.2
  • 20
    • 50049089775 scopus 로고    scopus 로고
    • S. McCanne and S. Floyd. Network Simulator Version 2
    • S. McCanne and S. Floyd. Network Simulator Version 2. http://www.isi.edu/nsnam/ns.
  • 21
    • 5044238739 scopus 로고    scopus 로고
    • Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad hoc Networks
    • September
    • P. Michiardi and R. Molva. Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad hoc Networks. InProc. Communications and Multimedia Security, September 2002.
    • (2002) Proc. Communications and Multimedia Security
    • Michiardi, P.1    Molva, R.2
  • 25
    • 34347349933 scopus 로고    scopus 로고
    • Ad hoc On-Demand Distance Vector Routing
    • Feb
    • C. E. Perkins and E. M. Royer. Ad hoc On-Demand Distance Vector Routing. In Proc. WMCSA, Feb. 1999.
    • (1999) Proc. WMCSA
    • Perkins, C.E.1    Royer, E.M.2
  • 26
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues and open problems
    • Proc. Intl Wkshp on Design Issues in Anonymity and Unobservability, of, Springer-Verlag
    • J.-F. Raymond. Traffic analysis: Protocols, attacks, design issues and open problems. In Proc. Intl Wkshp on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 10-29. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2009 , pp. 10-29
    • Raymond, J.-F.1
  • 31
    • 14544273666 scopus 로고    scopus 로고
    • The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems
    • November
    • M. Wright, M. Adler, B. N. Levine, and C. Shields. The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems. ACM TISSEC, 7(4), November 2004.
    • (2004) ACM TISSEC , vol.7 , Issue.4
    • Wright, M.1    Adler, M.2    Levine, B.N.3    Shields, C.4
  • 32
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad hoc Networks
    • L. Zhou and Z. J. Haas. Securing Ad hoc Networks. IEEE Network, 13(6):24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.