메뉴 건너뛰기




Volumn , Issue , 2006, Pages

A collusion attack against OLSR-based mobile ad hoc networks

Author keywords

Collusion attack; MANET; OLSR

Indexed keywords

COMPUTER SIMULATION; NETWORK SECURITY; OPTIMIZATION; ROUTING PROTOCOLS; TELECOMMUNICATION LINKS;

EID: 50949098419     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2006.262     Document Type: Conference Paper
Times cited : (43)

References (22)
  • 8
    • 84961572484 scopus 로고    scopus 로고
    • Y-C. Hu, D. B. Johnson, and A. Perrig SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, in Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), pp. 3-13, IEEE, Calicoon, NY, June 2002.
    • Y-C. Hu, D. B. Johnson, and A. Perrig "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," in Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), pp. 3-13, IEEE, Calicoon, NY, June 2002.
  • 9
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key Management for mobile ad hoc networks
    • January-March
    • S. Capkun, L. Nuttyan, and J. Hubaux, "Self-organized public-key Management for mobile ad hoc networks," IEEE Transactions on mobile computing, Vol. 2, No. 1, January-March, 2003.
    • (2003) IEEE Transactions on mobile computing , vol.2 , Issue.1
    • Capkun, S.1    Nuttyan, L.2    Hubaux, J.3
  • 12
    • 4544296236 scopus 로고    scopus 로고
    • Implementing a Fully Distributed Certificate Authority in an OLSR MANET
    • Atlanta, Georgia USA, March 21-25
    • D. Dhillon, T.S. Randhawa, M. Wang and L. Lamont, "Implementing a Fully Distributed Certificate Authority in an OLSR MANET," IEEE WCNC2004, Atlanta, Georgia USA, March 21-25, 2004.
    • (2004) IEEE WCNC2004
    • Dhillon, D.1    Randhawa, T.S.2    Wang, M.3    Lamont, L.4
  • 14
    • 34247520820 scopus 로고    scopus 로고
    • Attacks Against OLSR: Distributed Key Management for Security
    • Palaiseau, France, July 28-29
    • C. Adjih, D. Raffo, and P. Muhlethaler, "Attacks Against OLSR: Distributed Key Management for Security," 2nd OLSR Interop/ Workshop, Palaiseau, France, July 28-29, 2005.
    • (2005) 2nd OLSR Interop/ Workshop
    • Adjih, C.1    Raffo, D.2    Muhlethaler, P.3
  • 15
    • 12244259569 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
    • Tech. Rep. TR-2003-07, North Carolina State University, Department of Computer Science, February
    • P. Ning, and K. Sun, "How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols," Tech. Rep. TR-2003-07, North Carolina State University, Department of Computer Science, February 2003.
    • (2003)
    • Ning, P.1    Sun, K.2
  • 19
    • 33749048761 scopus 로고    scopus 로고
    • An Effective Intrusion Detection Approach for OLSR MANET Protocol
    • NPSec, Boston, Massachusetts, USA, November 6
    • M. Wang, L. Lamont, P Mason, M. Gorlatova, "An Effective Intrusion Detection Approach for OLSR MANET Protocol", First Workshop on Secure Network Protocols (NPSec), Boston, Massachusetts, USA, November 6, 2005.
    • (2005) First Workshop on Secure Network Protocols
    • Wang, M.1    Lamont, L.2    Mason, P.3    Gorlatova, M.4
  • 20
    • 0003403663 scopus 로고    scopus 로고
    • The Network Simulator - ns-2
    • The Vint Project, see http
    • The Vint Project, "The Network Simulator - ns-2," see http://www.isi.edu/nsnam/ns/index.html/.
  • 21
    • 34547308166 scopus 로고    scopus 로고
    • F. J. Ro, UM-OLSR Documentation, University of Murcia, March 2005, see http://masimum.dif.um.es/um-olsr/html/.
    • F. J. Ro, "UM-OLSR Documentation," University of Murcia, March 2005, see http://masimum.dif.um.es/um-olsr/html/.
  • 22
    • 3042802118 scopus 로고    scopus 로고
    • The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks
    • July/september
    • C. Bettstetter, G. Resta, and P. santi, "The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks," IEEE Transanction on Mobile Computing, Vol.2, No. 3, pp. 257-269, July/september, 2003.
    • (2003) IEEE Transanction on Mobile Computing , vol.2 , Issue.3 , pp. 257-269
    • Bettstetter, C.1    Resta, G.2    santi, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.