메뉴 건너뛰기




Volumn , Issue , 2008, Pages 189-200

Secure neighbor discovery in wireless networks: Formal investigation of possibility

Author keywords

Relay attack; Secure neighbor discovery; Wireless networks security

Indexed keywords

BROAD SPECTRUM; BUILDING BLOCKES; FORMAL MODEL; GENERAL CLASS; IMPOSSIBILITY RESULTS; LOCATION-BASED PROTOCOLS; NEIGHBOR DISCOVERY; RELAY ATTACK; SECURE NEIGHBOR DISCOVERY; TACTICAL SYSTEMS; WIRELESS COMMUNICATIONS; WIRELESS SYSTEMS;

EID: 58049188696     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1368310.1368338     Document Type: Conference Paper
Times cited : (59)

References (31)
  • 1
    • 85008543309 scopus 로고    scopus 로고
    • Provably secure on-demand source routing in mobile ad hoc networks
    • Gergely Ács, Levente Buttyán, and István Vajda. Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 5 (11):1533-1546, 2006.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.11 , pp. 1533-1546
    • Ács, G.1    Buttyán, L.2    István Vajda3
  • 4
    • 0029462943 scopus 로고    scopus 로고
    • Novel identification of intercepted signals from unknown radio transmitters
    • Howard C. Choe, Clark E. Poole, Andrea M. Yu, and Harold H. Szu. Novel identification of intercepted signals from unknown radio transmitters. In H. H. Szu, editor, Proc. SPIE Vol. 2491, p. 504-517
    • Proc. SPIE , vol.2491 , pp. 504-517
    • Choe, H.C.1    Poole, C.E.2    Yu, A.M.3    Szu, H.H.4
  • 5
    • 78751606829 scopus 로고
    • Wavelet applications II
    • Harold H. Szu; Ed. April, of Presented at the
    • Wavelet Applications II, Harold H. Szu; Ed., volume 2491 of Presented at the Society of Photo-Optical Instrumentation Engineers (SPIE) Conference, pages 504-517, April 1995.
    • (1995) Society of Photo-Optical Instrumentation Engineers (SPIE) Conference , vol.2491 , pp. 504-517
  • 7
    • 0019649307 scopus 로고
    • On the security of public key protocols (extended abstract)
    • Danny Dolev and Andrew Chi-Chih Yao. On the security of public key protocols (extended abstract). In FOCS, pages 350-357, 1981.
    • (1981) FOCS , pp. 350-357
    • Dolev, D.1    Chi-Chih Yao, A.2
  • 10
    • 33749684148 scopus 로고    scopus 로고
    • Security of emergent properties in ad-hoc networks (transcript of discussion)
    • Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors
    • Virgil D. Gligor. Security of emergent properties in ad-hoc networks (transcript of discussion). In Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors, Security Protocols Workshop, volume 3957 of Lecture Notes in Computer Science, pages 256-266, 2004.
    • (2004) Security Protocols Workshop, Volume 3957 of Lecture Notes in Computer Science , pp. 256-266
    • Gligor, V.D.1
  • 16
    • 84882715141 scopus 로고    scopus 로고
    • Distance bounding protocols: Authentication logic analysis and collusion attacks
    • Springer-Verlag, Series: Advances in Information Security, Poovendran, Radha; Wang, Cliff; Roy, Sumit Eds.
    • Catherine Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, and Paul Syverson. Distance bounding protocols: Authentication logic analysis and collusion attacks. In Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Springer-Verlag, Series: Advances in Information Security, Vol. 30 Poovendran, Radha; Wang, Cliff; Roy, Sumit (Eds.), 2007.
    • (2007) Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks , vol.30
    • Meadows, C.1    Poovendran, R.2    Pavlovic, D.3    Chang, L.4    Syverson, P.5
  • 17
    • 33750440529 scopus 로고    scopus 로고
    • A framework for security analysis of mobile wireless networks
    • Sebastian Nanz and Chris Hankin. A framework for security analysis of mobile wireless networks. Theoretical Computer Science, 367 (1):203-227, 2006.
    • (2006) Theoretical Computer Science , vol.367 , Issue.1 , pp. 203-227
    • Nanz, S.1    Hankin, C.2
  • 21
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • 8-11 May
    • Bryan Parno, Adrian Perrig, and Virgil Gligor. Distributed detection of node replication attacks in sensor networks. IEEE Symposium on Security and Privacy, 8-11 May 2005.
    • (2005) IEEE Symposium on Security and Privacy
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 22
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • Radha Poovendran and Loukas Lazos. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13 (1):27-59, 2007.
    • (2007) Wireless Networks , vol.13 , Issue.1 , pp. 27-59
    • Poovendran, R.1    Lazos, L.2
  • 23
    • 52049110580 scopus 로고    scopus 로고
    • Secure neighbor discovery in wireless networks: Formal investigation of possiblity
    • Marcin Poturalski, Panos Papadimitratos, and Jean-Pierre Hubaux. Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possiblity. Technical report, EPFL, 2007.
    • (2007) Technical Report, EPFL
    • Poturalski, M.1    Papadimitratos, P.2    Hubaux, J.3
  • 24
    • 51349107820 scopus 로고    scopus 로고
    • Implications of radio fingerprinting on the security of sensor networks
    • ETH Zürich
    • Kasper Bonne Rasmussen and Srdjan Čapkun. Implications of radio fingerprinting on the security of sensor networks. Technical Report 536, ETH Zürich, 2006.
    • (2006) Technical Report , vol.536
    • Rasmussen, K.B.1    Čapkun, S.2
  • 27
    • 4043157158 scopus 로고    scopus 로고
    • An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions
    • 29, July
    • Önder H. Tekbaş, Nur Serinken, and Oktay Üreten. An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions. IEEE Canadian Journal of Electrical and Computer Engineering, 29, July 2004.
    • (2004) IEEE Canadian Journal of Electrical and Computer Engineering
    • Tekbas, N.O.1    Serinken, N.2    Üreten, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.