메뉴 건너뛰기




Volumn 31, Issue 5, 2009, Pages 931-941

Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks

Author keywords

Denial of Service; IEEE 802.11; Interference; Jamming; MAC; Security

Indexed keywords

DENIAL-OF-SERVICE; IEEE 802.11; INTERFERENCE; MAC; SECURITY;

EID: 67349109409     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2008.09.038     Document Type: Review
Times cited : (114)

References (20)
  • 1
    • 67349220971 scopus 로고    scopus 로고
    • Wireless access points and ARP poisoning: wireless vulnerabilities that expose the wired network
    • Fleck B., and Dimov J. Wireless access points and ARP poisoning: wireless vulnerabilities that expose the wired network. White Paper (12/10/2001)
    • (2001) White Paper
    • Fleck, B.1    Dimov, J.2
  • 4
    • 4544221258 scopus 로고    scopus 로고
    • "Access points vulnerabilities to DoS attacks in 802.11 networks"
    • Bernaschi N., Ferreri F., and Valcamonici L. "Access points vulnerabilities to DoS attacks in 802.11 networks". Wireless Networks (2004) 634-638
    • (2004) Wireless Networks , pp. 634-638
    • Bernaschi, N.1    Ferreri, F.2    Valcamonici, L.3
  • 5
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 Denial-of-Service attacks: real vulnerabilities and practical solutions
    • Bellardo J., and Savage S. 802.11 Denial-of-Service attacks: real vulnerabilities and practical solutions. Proceedings of USENIX Security Symposium (2003)
    • (2003) Proceedings of USENIX Security Symposium
    • Bellardo, J.1    Savage, S.2
  • 10
    • 33745062882 scopus 로고    scopus 로고
    • Jamming in sensor networks: attack and defense strategies
    • Xu W., Ma K., Trappe W., and Zhang Y. Jamming in sensor networks: attack and defense strategies. IEEE Network 20 (2006) 41-47
    • (2006) IEEE Network , vol.20 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 15
    • 33745636711 scopus 로고    scopus 로고
    • Detecting wireless LAN MAC address spoofing
    • Wright J. Detecting wireless LAN MAC address spoofing. white paper (1/21/2003)
    • (2003) white paper
    • Wright, J.1
  • 16
    • 67349167940 scopus 로고    scopus 로고
    • RFC 5201 - Host Identity Protocol (HIP), available at http://www.ietf.org/rfc/rfc5201.txt.
    • RFC 5201 - Host Identity Protocol (HIP), available at http://www.ietf.org/rfc/rfc5201.txt.
  • 18
    • 33745663748 scopus 로고    scopus 로고
    • Sequence number-based MAC address spoof detection
    • Proceedings of 8th Recent Advances in Intrusion Detection Symposium (RAID 2005), Springer
    • Guo F., and Chiueh T. Sequence number-based MAC address spoof detection. Proceedings of 8th Recent Advances in Intrusion Detection Symposium (RAID 2005). LNCS vol. 3858 (2006), Springer 309-329
    • (2006) LNCS , vol.3858 , pp. 309-329
    • Guo, F.1    Chiueh, T.2
  • 20
    • 43949084058 scopus 로고    scopus 로고
    • Malware in IEEE 802.11 wireless networks
    • Proceedings of 9th International Conference on Passive and Active Network Measurement (PAM 2008), Springer
    • Stone-Gross B., Wilson C., Almeroth K.C., Belding E.M., Zheng H., and Papagiannaki K. Malware in IEEE 802.11 wireless networks. Proceedings of 9th International Conference on Passive and Active Network Measurement (PAM 2008). LNCS 4979 (2008), Springer 222-231
    • (2008) LNCS , vol.4979 , pp. 222-231
    • Stone-Gross, B.1    Wilson, C.2    Almeroth, K.C.3    Belding, E.M.4    Zheng, H.5    Papagiannaki, K.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.