메뉴 건너뛰기




Volumn , Issue , 2008, Pages 224-232

On the pitfalls of high-throughput multicast metrics in adversarial wireless mesh networks

Author keywords

[No Author keywords available]

Indexed keywords

AD-HOC COMMUNICATIONS; ADVERSARIAL NETWORKS; COMPROMISED NODES; DATA FORWARDING; HIGH THROUGHPUTS; LINK QUALITY; LOCAL ESTIMATION; MAXIMIZE THROUGHPUT; MEASUREMENT-BASED; MULTICAST; MULTICAST PROTOCOLS; MULTICAST ROUTING; PATH METRIC; PATH SELECTION; PROTECTION MECHANISMS; TRANSIENT NETWORK; UNICAST; WIRELESS MESH NETWORKS;

EID: 52049117391     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAHCN.2008.36     Document Type: Conference Paper
Times cited : (7)

References (35)
  • 1
    • 0036924859 scopus 로고    scopus 로고
    • Flooding-based geocasting protocols for mobile ad hoc networks
    • Y. B. Ko and N. H. Vaidya, "Flooding-based geocasting protocols for mobile ad hoc networks," Mob. Netw. Appl., volT 7, no. 6, 2002.
    • (2002) Mob. Netw. Appl , vol.7 T , Issue.6
    • Ko, Y.B.1    Vaidya, N.H.2
  • 2
    • 0035016827 scopus 로고    scopus 로고
    • Anonymous gossip: Improving multicast reliability in mobile ad-hoc networks
    • R. Chandra, V. Ramasubramanian, and K. Birman, "Anonymous gossip: Improving multicast reliability in mobile ad-hoc networks," in Proc. of ICDCS, 2001.
    • (2001) Proc. of ICDCS
    • Chandra, R.1    Ramasubramanian, V.2    Birman, K.3
  • 3
    • 0034499548 scopus 로고    scopus 로고
    • GeoTORA: A protocol for geocasting in mobile ad hoc networks
    • IEEE
    • Y-B. Ko and N. H. Vaidya, "GeoTORA: a protocol for geocasting in mobile ad hoc networks," in Proc. of ICNP. IEEE. 2000. p. 240.
    • (2000) Proc. of ICNP , pp. 240
    • Ko, Y.-B.1    Vaidya, N.H.2
  • 4
    • 0035268368 scopus 로고    scopus 로고
    • Scalable multicasting: The core-assisted mesh protocol
    • E. L. Madruga and J. J. Garcia-Luna-Aceves, "Scalable multicasting: the core-assisted mesh protocol," Mob. Netw. Appl., vol. 6, no. 2, 2001.
    • (2001) Mob. Netw. Appl , vol.6 , Issue.2
    • Madruga, E.L.1    Garcia-Luna-Aceves, J.J.2
  • 5
    • 0036924499 scopus 로고    scopus 로고
    • On-demand multicast routing protocol in multihop wireless mobile networks
    • S. J. Lee, W. Su, and M. Gerla, "On-demand multicast routing protocol in multihop wireless mobile networks," Mob. Netw. Appl., 2002.
    • (2002) Mob. Netw. Appl
    • Lee, S.J.1    Su, W.2    Gerla, M.3
  • 6
    • 11144257116 scopus 로고    scopus 로고
    • Multicast ad-hoc on-demand distance vector (MAODV) routing
    • July
    • E. M. Rqyer and C. E. Perkins, "Multicast ad-hoc on-demand distance vector (MAODV) routing," in Internet Draft, July 2000.
    • (2000) Internet Draft
    • Rqyer, E.M.1    Perkins, C.E.2
  • 7
    • 0035789901 scopus 로고    scopus 로고
    • Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks
    • J. G. Jetcheva and D. B. Johnson, "Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks." in Proc. of MobiHoc, 2001, pp. 33-44.
    • (2001) Proc. of MobiHoc , pp. 33-44
    • Jetcheva, J.G.1    Johnson, D.B.2
  • 8
    • 0036980106 scopus 로고    scopus 로고
    • Coping with communication gray zones in IEEE 802.11b based ad hoc networks
    • ACM Press
    • H. Lundgren, E. Nordstrom, and C. Tschudin, "Coping with communication gray zones in IEEE 802.11b based ad hoc networks," in Proc. of WOWMOM '02. ACM Press, 2002, pp. 49-55.
    • (2002) Proc. of WOWMOM '02 , pp. 49-55
    • Lundgren, H.1    Nordstrom, E.2    Tschudin, C.3
  • 9
    • 1542359009 scopus 로고    scopus 로고
    • A high-throughput path metric For multi-hop wireless routing
    • ACM
    • D. S. J. D. Couto, D. Aguayo, J. C. Bicket, and R. Morris, "A high-throughput path metric For multi-hop wireless routing," in Proc. of MOBICOM '03. ACM, 2003, pp. 134-146.
    • (2003) Proc. of MOBICOM '03 , pp. 134-146
    • Couto, D.S.J.D.1    Aguayo, D.2    Bicket, J.C.3    Morris, R.4
  • 10
    • 33947641587 scopus 로고    scopus 로고
    • High-throughput multicast routing metrics in wireless mesh networks
    • S. Roy, D. Koutsonikolas, S. Das, and C. Hu, "High-throughput multicast routing metrics in wireless mesh networks," in Proc. of ICDCS '06, 2006.
    • (2006) Proc. of ICDCS '06
    • Roy, S.1    Koutsonikolas, D.2    Das, S.3    Hu, C.4
  • 15
    • 11244335412 scopus 로고    scopus 로고
    • Routing in multi-radio, multi-hop wireless mesh networks
    • ACM
    • R. Draves, J. Padhye, and B. Zill, "Routing in multi-radio, multi-hop wireless mesh networks," in Proc. of MOBICOM '04. ACM, 2004.
    • (2004) Proc. of MOBICOM '04
    • Draves, R.1    Padhye, J.2    Zill, B.3
  • 16
    • 0013138682 scopus 로고    scopus 로고
    • Secure routing for mobile ad hoc networks
    • January
    • P. Papadimitratos and Z. Haas, "Secure routing for mobile ad hoc networks," in Proc. of CNDS, January 2002, pp. 27-31.
    • (2002) Proc. of CNDS , pp. 27-31
    • Papadimitratos, P.1    Haas, Z.2
  • 17
    • 84961572484 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • June
    • Y.-C. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," in Proc. of WMCSA, June 2002.
    • (2002) Proc. of WMCSA
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 18
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proc. of MOBICOM, 2002.
    • (2002) Proc. of MOBICOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 20
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • August
    • S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. of MOBICOM, August 2000.
    • (2000) Proc. of MOBICOM
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 21
    • 1542287664 scopus 로고    scopus 로고
    • Secure data transmission in mobile ad hoc networks
    • P. Papadimitratos and Z. Haas, "Secure data transmission in mobile ad hoc networks," in Proc. of WiSe, 2003, pp. 41-50.
    • (2003) Proc. of WiSe , pp. 41-50
    • Papadimitratos, P.1    Haas, Z.2
  • 22
    • 0036986441 scopus 로고    scopus 로고
    • An on-demand secure routing protocol resilient to byzantine failures
    • ACM Press
    • B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An on-demand secure routing protocol resilient to byzantine failures," in Proc. of WiSe'02. ACM Press. 2002.
    • (2002) Proc. of WiSe'02
    • Awerbuch, B.1    Holmer, D.2    Nita-Rotaru, C.3    Rubens, H.4
  • 25
    • 48049116219 scopus 로고    scopus 로고
    • BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks
    • June
    • R. Curtmola and C. Nita-Rotaru, "BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks," in Proc. of IEEE SECON '07, June 2007.
    • (2007) Proc. of IEEE SECON '07
    • Curtmola, R.1    Nita-Rotaru, C.2
  • 26
    • 13844302260 scopus 로고    scopus 로고
    • Comparison of routing metrics for static multi-hop wireless networks
    • R. Draves, J. Padhye. and B. Zill, "Comparison of routing metrics for static multi-hop wireless networks," in Proc. of SIGCOMM '04, 2004.
    • (2004) Proc. of SIGCOMM '04
    • Draves, R.1    Padhye, J.2    Zill, B.3
  • 27
    • 52049119349 scopus 로고    scopus 로고
    • High-throughput multicast routing metrics in wireless mesh networks
    • S. Roy, D. Koutsonikolas, S. Das, and C. Hu, "High-throughput multicast routing metrics in wireless mesh networks," Elsevier Ad Hoc Ntwks, 2007.
    • (2007) Elsevier Ad Hoc Ntwks
    • Roy, S.1    Koutsonikolas, D.2    Das, S.3    Hu, C.4
  • 28
    • 3042667172 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • Y.-C. Hu, A. Perrig. and D. B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols," in Proc. of WiSe. 2003.
    • (2003) Proc. of WiSe
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 29
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Y.-C. Hu. A. Perrig, and D. B. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," in Proc. of INFOCOM, 2003.
    • (2003) Proc. of INFOCOM
    • Perrig, Y.-C.H.A.1    Johnson, D.B.2
  • 30
    • 46149096001 scopus 로고    scopus 로고
    • Truelink: A practical countermeasure to the wormhole attack in wireless networks
    • J. Eriksson, S. V. Krishnamurthy, and M. Faloutsos, "Truelink: A practical countermeasure to the wormhole attack in wireless networks," in Proc. of ICNP '06, 2006.
    • (2006) Proc. of ICNP '06
    • Eriksson, J.1    Krishnamurthy, S.V.2    Faloutsos, M.3
  • 31
    • 84977898401 scopus 로고    scopus 로고
    • Using directional antennas to prevent wormhole attacks
    • L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks," in Proc. of NDSS, 2004.
    • (2004) Proc. of NDSS
    • Hu, L.1    Evans, D.2
  • 32
    • 15744368857 scopus 로고    scopus 로고
    • Efficient and secure source authentication for multicast
    • February
    • A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast, in Proc. of NDSS, February 2001.
    • (2001) Proc. of NDSS
    • Perrig, A.1    Canetti, R.2    Song, D.3    Tygar, D.4
  • 33
    • 52049110580 scopus 로고    scopus 로고
    • Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possiblity,
    • Tech. Rep
    • M. Poturalski, P. Papadimitratos, and J.-P. Hubaux, "Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possiblity," Tech. Rep., 2007.
    • (2007)
    • Poturalski, M.1    Papadimitratos, P.2    Hubaux, J.-P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.