메뉴 건너뛰기




Volumn 6, Issue 2, 2009, Pages 111-123

Evaluating the vulnerability of network traffic using joint security and routing analysis

Author keywords

Adversary models.; Node capture attacks; Routing; Security; Wireless networks

Indexed keywords

APPROXIMATION ALGORITHMS; INTEGER PROGRAMMING; INTERNET PROTOCOLS; NETWORK ROUTING; ROUTING PROTOCOLS; WIRELESS NETWORKS;

EID: 67649198136     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2008.60     Document Type: Article
Times cited : (33)

References (22)
  • 1
    • 51349151780 scopus 로고    scopus 로고
    • Vulnerability of Network Traffic Under Node Capture Attacks Using Circuit Theoretic Analysis
    • Apr
    • P. Tague, D. Slater, J. Rogers, and R. Poovendran, "Vulnerability of Network Traffic Under Node Capture Attacks Using Circuit Theoretic Analysis," Proc. IEEE INFOCOM '08, pp. 664-672, Apr. 2008.
    • (2008) Proc. IEEE INFOCOM '08 , pp. 664-672
    • Tague, P.1    Slater, D.2    Rogers, J.3    Poovendran, R.4
  • 4
    • 34248339107 scopus 로고    scopus 로고
    • Modeling Adaptive Node Capture Attacks in Multi-Hop Wireless Networks
    • Aug
    • P. Tague and R. Poovendran, "Modeling Adaptive Node Capture Attacks in Multi-Hop Wireless Networks," Ad Hoc Networks, vol. 5, no. 6, pp. 801-814, Aug. 2007.
    • (2007) Ad Hoc Networks , vol.5 , Issue.6 , pp. 801-814
    • Tague, P.1    Poovendran, R.2
  • 7
    • 16644374371 scopus 로고    scopus 로고
    • Establishing Pairwise Keys in Distributed Sensor Networks
    • Feb
    • D. Liu, P. Ning, and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks," ACM Trans. Information and System Security, vol. 8, no. 1, pp. 41-77, Feb. 2005.
    • (2005) ACM Trans. Information and System Security , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Li, R.3
  • 9
    • 1842815876 scopus 로고    scopus 로고
    • Security Based on Network Topology against the Wiretapping Attack
    • Feb
    • K. Jain, "Security Based on Network Topology against the Wiretapping Attack," IEEE Wireless Comm., vol. 11, no. 1, pp. 68-71, Feb. 2004.
    • (2004) IEEE Wireless Comm , vol.11 , Issue.1 , pp. 68-71
    • Jain, K.1
  • 15
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Nov
    • A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 18
    • 84865507939 scopus 로고    scopus 로고
    • Introducing Traffic Analysis
    • A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. di Vimercati, eds, Auerbach, Dec
    • G. Danezis and R. Clayton, "Introducing Traffic Analysis," Digital Privacy: Theory, Technologies, and Practices, A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. di Vimercati, eds., Auerbach, Dec. 2007.
    • (2007) Digital Privacy: Theory, Technologies, and Practices
    • Danezis, G.1    Clayton, R.2
  • 19
    • 0000951232 scopus 로고
    • Worst-Case Analysis of Greedy Heuristics for Integer Programming with Nonnegative Data
    • Nov
    • G. Dobson, "Worst-Case Analysis of Greedy Heuristics for Integer Programming with Nonnegative Data," Math. of Operations Research, vol. 7, no. 4, pp. 515-531, Nov. 1982.
    • (1982) Math. of Operations Research , vol.7 , Issue.4 , pp. 515-531
    • Dobson, G.1
  • 20
    • 0000301097 scopus 로고
    • Greedy Heuristic for the Set-Covering Problem
    • Aug
    • V. Chvatel, "Greedy Heuristic for the Set-Covering Problem," Math, of Operations Research, vol. 4, no. 3, pp. 233-235, Aug. 1979.
    • (1979) Math, of Operations Research , vol.4 , Issue.3 , pp. 233-235
    • Chvatel, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.