메뉴 건너뛰기




Volumn 25, Issue 4, 2008, Pages 209-215

Defending mechanisms against sybil attack in next generation mobile ad hoc networks

Author keywords

AdHoc network; Impersonation attack; Information security; Network security; Sybil attack

Indexed keywords

ADHOC NETWORK; DEFENSE MECHANISMS; DETECTION SCHEMES; DETECTION TECHNIQUES; FUTURE RESEARCHES; IMPERSONATION ATTACK; INFORMATION SECURITY; NEXT GENERATION MOBILES; SYBIL ATTACK;

EID: 58149526685     PISSN: 02564602     EISSN: None     Source Type: Journal    
DOI: 10.4103/0256-4602.42813     Document Type: Article
Times cited : (18)

References (11)
  • 2
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc networks
    • L. Zhou, and Z.J. Haas, "Securing Ad Hoc networks," IEEE Network, Vol. 13 No. 6, pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 11
    • 58149501522 scopus 로고    scopus 로고
    • C. Piro, C. Shields, and B. N. Levine, Detecting the sybil attack in mobile Ad Hoc networks, Proceeding of the Second International Conference on Security & Privacy in Communication Networks, Edited by Mukesh Singhal & John Baras Baltimore, M.D.: IEEE press, 2006.
    • C. Piro, C. Shields, and B. N. Levine, "Detecting the sybil attack in mobile Ad Hoc networks," Proceeding of the Second International Conference on Security & Privacy in Communication Networks, Edited by Mukesh Singhal & John Baras Baltimore, M.D.: IEEE press, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.