메뉴 건너뛰기




Volumn , Issue , 2006, Pages

MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks

Author keywords

Mobile ad hoc networks; Neighbor watch; Node isolation; Secure neighbor discovery; Wormhole attack

Indexed keywords

CONTROL TRAFFIC; DATA TRAFFIC; DIRECTIONAL ANTENNAS; GLOBAL TRACKING; MALICIOUS NODES; MOBILE AD-HOC NETWORKS; MOBILE NETWORKS; MOBILE NODES; MULTI HOPPING; MULTI-HOP WIRELESS NETWORKS; NEIGHBOR WATCH; NODE ISOLATION; RESOURCE REQUIREMENTS; SECURE NEIGHBOR DISCOVERY; SECURITY ATTACKS; SPECIALIZED HARDWARE; STATIC NETWORKS; WIRELESS SYSTEMS; WORMHOLE ATTACK;

EID: 50049132985     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECCOMW.2006.359564     Document Type: Conference Paper
Times cited : (35)

References (46)
  • 3
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad-hoc networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad-hoc networks," in ACM MobiCom'02, pp. 12-23, 2002.
    • (2002) ACM MobiCom'02 , pp. 12-23
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 5
    • 0034539015 scopus 로고    scopus 로고
    • Directed diffusion: A scalable and robust communication paradigm for sensor networks
    • C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks," in ACM MobiCom'00), pp. 65-67, 2000.
    • (2000) ACM MobiCom'00) , pp. 65-67
    • Intanagonwiwat, C.1    Govindan, R.2    Estrin, D.3
  • 12
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad-hoc networks
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad-hoc networks," in ACM MobiCom'00, pp. 255-265, 2000.
    • (2000) ACM MobiCom'00 , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 13
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y. C. Hu, A. Perrig, and D.B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in IEEE INFOCOM, pp. 1976-1986, 2003.
    • (2003) IEEE INFOCOM , pp. 1976-1986
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 17
    • 0003491910 scopus 로고    scopus 로고
    • Multipoint Relaying: An Efficent Technique for Flooding in Mobile Wireless Networks,
    • RR-3898, project HIPEERCOM, INRIA, February
    • A. Qayyum, L. Viennot, and A. Laouiti, "Multipoint Relaying: An Efficent Technique for Flooding in Mobile Wireless Networks," Technical Report Research Report RR-3898, project HIPEERCOM, INRIA, February 2000.
    • (2000) Technical Report Research Report
    • Qayyum, A.1    Viennot, L.2    Laouiti, A.3
  • 18
    • 0032669825 scopus 로고    scopus 로고
    • A Reliable, Efficient Topology Broadcast for Dynamic Networks
    • B. Bellur and R. G. Ogier, "A Reliable, Efficient Topology Broadcast for Dynamic Networks," in IEEE INFOCOM'99, pp. 178-186, 1999.
    • (1999) IEEE INFOCOM'99 , pp. 178-186
    • Bellur, B.1    Ogier, R.G.2
  • 21
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol
    • S. Buchegger and J.-Y. Le Boudec, "Performance analysis of the CONFIDANT protocol," in ACM MobiHoc, pp. 226-236, 2002.
    • (2002) ACM MobiHoc , pp. 226-236
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 24
  • 33
    • 11244273945 scopus 로고    scopus 로고
    • Localization for Mobile Sensor Networks
    • L. Hu and D. Evans, "Localization for Mobile Sensor Networks," in ACM MobiCom'04, pp. 45-57, 2004.
    • (2004) ACM MobiCom'04 , pp. 45-57
    • Hu, L.1    Evans, D.2
  • 36
    • 84866469313 scopus 로고    scopus 로고
    • L. Lazos and R. Poovendran, SeRLoc: Robust Localization for Wireless Sensor Networks, in ACM Transactions on Sensor Networks (TOSN), 1, Issue 1, pp. 73-100, 2005.
    • L. Lazos and R. Poovendran, "SeRLoc: Robust Localization for Wireless Sensor Networks," in ACM Transactions on Sensor Networks (TOSN), Volume 1, Issue 1, pp. 73-100, 2005.
  • 37
    • 27644548026 scopus 로고    scopus 로고
    • Fault-tolerant cluster-wise clock synchronization for wireless sensor networks
    • K. Sun, P. Ning, and C. Wang, "Fault-tolerant cluster-wise clock synchronization for wireless sensor networks," in the IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 2, Issue 3, pp.177-189, 2005.
    • (2005) IEEE Transactions on Dependable and Secure Computing (TDSC) , vol.2 , Issue.3 , pp. 177-189
    • Sun, K.1    Ning, P.2    Wang, C.3
  • 42
    • 3042785862 scopus 로고    scopus 로고
    • The Sybil attack in Sensor Networks: Analysis & Defenses
    • J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in Sensor Networks: Analysis & Defenses," IPSN'04, pp. 259-268, 2004.
    • (2004) IPSN'04 , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 43
    • 85116427082 scopus 로고    scopus 로고
    • Defending against Sybil Attacks in Sensor Networks
    • Q. Zhang, P. Wang, D. S. Reeves, and P. Ning, "Defending against Sybil Attacks in Sensor Networks," in SDCS'05, pp. 185-191, 2005.
    • (2005) SDCS'05 , pp. 185-191
    • Zhang, Q.1    Wang, P.2    Reeves, D.S.3    Ning, P.4
  • 44
    • 27544479643 scopus 로고    scopus 로고
    • Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Network
    • G. Khanna, S. Bagchi, and Y.-S. Wu, "Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Network," in IEEE DSN'04, pp. 739-748, 2004.
    • (2004) IEEE DSN'04 , pp. 739-748
    • Khanna, G.1    Bagchi, S.2    Wu, Y.-S.3
  • 45
    • 0031357724 scopus 로고    scopus 로고
    • Performance analysis of Mac protocols for wireless LAN in Rayleigh and shadow fast fading
    • J. H. Kim and J. K. Lee, "Performance analysis of Mac protocols for wireless LAN in Rayleigh and shadow fast fading," im IEEE Global Telecommunications Conference (GLOBECOM), Vol. 1, pp. 404-408, 1997.
    • (1997) im IEEE Global Telecommunications Conference (GLOBECOM) , vol.1 , pp. 404-408
    • Kim, J.H.1    Lee, J.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.