메뉴 건너뛰기




Volumn 9, Issue 4, 2009, Pages 469-488

Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC

Author keywords

Cryptography; IEEE802.11; MANET; RTS CTS mechanism; Security; Vulnerabilities

Indexed keywords

IEEE802.11; MANET; RTS/CTS MECHANISM; SECURITY; VULNERABILITIES;

EID: 65249160136     PISSN: 15308669     EISSN: None     Source Type: Journal    
DOI: 10.1002/wcm.690     Document Type: Article
Times cited : (7)

References (26)
  • 8
    • 49749129647 scopus 로고    scopus 로고
    • On MAC layer misbehavior in wireless networks: Challenges and solutions
    • Guang L, Assi C, Benslimane A. On MAC layer misbehavior in wireless networks: challenges and solutions. IEEE Wireless Communication Magazine 2008; 15(4): 6-14.
    • (2008) IEEE Wireless Communication Magazine , vol.15 , Issue.4 , pp. 6-14
    • Guang, L.1    Assi, C.2    Benslimane, A.3
  • 14
    • 65249173333 scopus 로고    scopus 로고
    • http://madwifi.org/
  • 18
    • 84907689849 scopus 로고    scopus 로고
    • Ray S, Carruthers JB, Starobinski D. RTS/CTS-induced congestion in ad hoc wireless LANs. In IEEE WCNC, 2003; 3: 1516-1521.
    • Ray S, Carruthers JB, Starobinski D. RTS/CTS-induced congestion in ad hoc wireless LANs. In IEEE WCNC, 2003; 3: 1516-1521.
  • 19
    • 65249140401 scopus 로고    scopus 로고
    • The editors of IEEE 802.11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification, 1999.
    • The editors of IEEE 802.11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification, 1999.
  • 20
    • 65249102653 scopus 로고    scopus 로고
    • http://www.atheros.com/
  • 21
    • 65249103831 scopus 로고    scopus 로고
    • http://www.wireshark.org/
  • 22
    • 3142775283 scopus 로고    scopus 로고
    • Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks
    • Xu K, Gerla M, Bae S. Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks. In Ad Hoc Network Journal 2003; 1(1): 107-123.
    • (2003) Ad Hoc Network Journal , vol.1 , Issue.1 , pp. 107-123
    • Xu, K.1    Gerla, M.2    Bae, S.3
  • 23
    • 84886059094 scopus 로고    scopus 로고
    • A secure architecture for mobile ad hoc networks
    • Proceedings of International Conference on Mobile Ad-Hoc and Sensor Networks MSN'06, Hong Kong, China
    • Rachedi A, Benslimane A. A secure architecture for mobile ad hoc networks. In Proceedings of International Conference on Mobile Ad-Hoc and Sensor Networks (MSN'06), Lecture Notes in Computer Science, Vol. 4325, Hong Kong, China, 2006; 424-435.
    • (2006) Lecture Notes in Computer Science , vol.4325 , pp. 424-435
    • Rachedi, A.1    Benslimane, A.2
  • 24
    • 0035015898 scopus 로고    scopus 로고
    • Investigating the energy consumption of a wireless network interface in an ad hoc networking environment
    • Feeney LM, Nilsson M. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In Proceedings of IEEE INFOCOM'01, 2001; 1548-1557.
    • (2001) Proceedings of IEEE INFOCOM'01 , pp. 1548-1557
    • Feeney, L.M.1    Nilsson, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.