메뉴 건너뛰기




Volumn 5546 LNCS, Issue , 2009, Pages 85-96

The Quest for mobility models to analyse security in mobile ad hoc networks

Author keywords

Distributed protocol; Mobility models; Node capture attack detection; Resilience; Wireless Ad Hoc networks security

Indexed keywords

DISTRIBUTED PROTOCOL; MOBILITY MODELS; NODE CAPTURE ATTACK DETECTION; RESILIENCE; WIRELESS AD HOC NETWORKS SECURITY;

EID: 69849084397     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02118-3_8     Document Type: Conference Paper
Times cited : (8)

References (24)
  • 1
    • 34948881799 scopus 로고    scopus 로고
    • Stochastic properties of mobility models in mobile ad hoc networks
    • DOI 10.1109/TMC.2007.1014
    • Bandyopadhyay, S., Coyle, E.J., Falck, T.: Stochastic properties of mobility models in mobile ad hoc networks. IEEE Transactions on Mobile Computing 6(11), 1218-1229 (2007) (Pubitemid 47525356)
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.11 , pp. 1218-1229
    • Bandyopadhyay, S.1    Coyle, E.J.2    Falck, T.3
  • 2
    • 36849034196 scopus 로고    scopus 로고
    • Topology properties of ad hoc networks with random waypoint mobility
    • Bettstetter, C.: Topology properties of ad hoc networks with random waypoint mobility. SIG-MOBILE Mob. Comput. Commun. Rev. 7(3), 50-52 (2003)
    • (2003) SIG-MOBILE Mob. Comput. Commun. Rev. , vol.7 , Issue.3 , pp. 50-52
    • Bettstetter, C.1
  • 4
    • 37849004592 scopus 로고    scopus 로고
    • A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
    • Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In: MobiHoc 2007 (2007)
    • (2007) MobiHoc 2007
    • Conti, M.1    Di Pietro, R.2    Mancini, L.V.3    Mei, A.4
  • 5
    • 56749181478 scopus 로고    scopus 로고
    • Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks
    • Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks. In: WiSec 2008, pp. 214-219 (2008)
    • (2008) WiSec 2008 , pp. 214-219
    • Conti, M.1    Di Pietro, R.2    Mancini, L.V.3    Mei, A.4
  • 6
    • 34047106767 scopus 로고    scopus 로고
    • A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks
    • Curtmola, R., Kamara, S.: A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks. Electronic Notes in Theoretical Computer Science (ENTCS) 171(1), 57-69 (2007)
    • (2007) Electronic Notes in Theoretical Computer Science (ENTCS) , vol.171 , Issue.1 , pp. 57-69
    • Curtmola, R.1    Kamara, S.2
  • 7
    • 33845926634 scopus 로고    scopus 로고
    • An RSSI-based scheme for sybil attack detection in wireless sensor networks
    • Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: WOWMOM 2006 (2006)
    • (2006) WOWMOM 2006
    • Demirbas, M.1    Song, Y.2
  • 8
    • 33749625947 scopus 로고    scopus 로고
    • Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks
    • Di Pietro, R., Mancini, L.V., Mei, A.: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 12(6), 709-721 (2006)
    • (2006) Wireless Networks , vol.12 , Issue.6 , pp. 709-721
    • Di Pietro, R.1    Mancini, L.V.2    Mei, A.3
  • 9
    • 33847323575 scopus 로고    scopus 로고
    • Securing topology maintenance protocols for sensor networks: Attacks and countermeasures
    • Gabrielli, A., Mancini, L.V., Setia, S., Jajodia, S.: Securing topology maintenance protocols for sensor networks: Attacks and countermeasures. In: SecureComm 2005, pp. 101-112 (2005)
    • (2005) SecureComm 2005 , pp. 101-112
    • Gabrielli, A.1    Mancini, L.V.2    Setia, S.3    Jajodia, S.4
  • 10
    • 0042975095 scopus 로고    scopus 로고
    • Locating nodes with EASE: Last encounter routing in ad hoc networks through mobility diffusion
    • Grossglauser, M., Vetterli, M.: Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion. In: INFOCOM 2003 (2003)
    • (2003) INFOCOM 2003
    • Grossglauser, M.1    Vetterli, M.2
  • 11
    • 0036444933 scopus 로고    scopus 로고
    • Failure detectors for large-scale distributed systems
    • Hayashibara, N., Cherif, A., Katayama, T.: Failure detectors for large-scale distributed systems. In: SRDS 2002 (2002)
    • (2002) SRDS 2002
    • Hayashibara, N.1    Cherif, A.2    Katayama, T.3
  • 12
    • 33646407130 scopus 로고    scopus 로고
    • Spatial node distribution of the random waypoint mobility model with applications
    • Hyytiä, E., Lassila, P., Virtamo, J.: Spatial node distribution of the random waypoint mobility model with applications. IEEE Transactions on Mobile Computing 5(6), 680-694 (2006)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.6 , pp. 680-694
    • Hyytiä, E.1    Lassila, P.2    Virtamo, J.3
  • 14
    • 34247555864 scopus 로고    scopus 로고
    • A distributed and efficient flooding scheme using 1-hop information in mobile ad hoc networks
    • Liu, H., Wan, P.-J., Liu, X., Yao, F.: A distributed and efficient flooding scheme using 1-hop information in mobile ad hoc networks. IEEE Transactions on Parallel and Distributed Systems 18(5), 658-671 (2007)
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , Issue.5 , pp. 658-671
    • Liu, H.1    Wan, P.-J.2    Liu, X.3    Yao, F.4
  • 15
    • 25844459686 scopus 로고    scopus 로고
    • Joint mobility and routing for lifetime elongation in wireless sensor networks
    • Luo, J., Hubaux, J.-P.: Joint mobility and routing for lifetime elongation in wireless sensor networks. In: INFOCOM 2005 (2005)
    • (2005) INFOCOM 2005
    • Luo, J.1    Hubaux, J.-P.2
  • 16
    • 70349656216 scopus 로고    scopus 로고
    • SWIM: A simple model to generate small mobile worlds
    • Mei, A., Stefa, J.: SWIM: A simple model to generate small mobile worlds. In: INFOCOM 2009 (2009)
    • (2009) INFOCOM 2009
    • Mei, A.1    Stefa, J.2
  • 17
    • 3042785862 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: Analysis & defenses
    • Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004 (2004)
    • (2004) IPSN 2004
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 19
    • 50049120615 scopus 로고    scopus 로고
    • Detecting the sybil attack in mobile ad hoc networks
    • Piro, C., Shields, C., Levine, B.N.: Detecting the sybil attack in mobile ad hoc networks. In: SecureComm 2006 (2006)
    • (2006) SecureComm 2006
    • Piro, C.1    Shields, C.2    Levine, B.N.3
  • 21
    • 39049148855 scopus 로고    scopus 로고
    • Delay and capacity trade-offs in mobile ad hoc networks: A global perspective
    • Sharma, G., Mazumdar, R., Shroff, N.B.: Delay and capacity trade-offs in mobile ad hoc networks: A global perspective. In: INFOCOM 2006 (2006)
    • (2006) INFOCOM 2006
    • Sharma, G.1    Mazumdar, R.2    Shroff, N.B.3
  • 22
    • 42549112648 scopus 로고    scopus 로고
    • A robust, distributed TGDH-based scheme for secure group communications in MANET
    • Striki, M., Baras, J., Manousakis, K.: A robust, distributed TGDH-based scheme for secure group communications in MANET. In: Proceedings of ICC 2004 (2006)
    • (2006) Proceedings of ICC 2004
    • Striki, M.1    Baras, J.2    Manousakis, K.3
  • 23
    • 11044237379 scopus 로고    scopus 로고
    • A two-zone hybrid routing protocol for mobile ad hoc networks
    • Wang, L., Olariu, S.: A two-zone hybrid routing protocol for mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 15(12), 1105-1116 (2004)
    • (2004) IEEE Trans. Parallel Distrib. Syst. , vol.15 , Issue.12 , pp. 1105-1116
    • Wang, L.1    Olariu, S.2
  • 24


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.