메뉴 건너뛰기




Volumn , Issue , 2009, Pages 2428-2436

Thwarting blackhole attacks in distruption-tolerant networks using encounter tickets

Author keywords

Blackhole attacks; Disruption tolerant networks (DTNs); Encounter tickets; Observation; PKI; Security; Uncertainty

Indexed keywords

BLACKHOLE ATTACKS; DISRUPTION-TOLERANT NETWORKS (DTNS); ENCOUNTER TICKETS; OBSERVATION; PKI; SECURITY; UNCERTAINTY;

EID: 70349684505     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2009.5062170     Document Type: Conference Paper
Times cited : (113)

References (23)
  • 5
    • 0242443768 scopus 로고    scopus 로고
    • Age matters: Efficient route discovery in mobile ad hoc networks using encounter ages
    • H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli. Age matters: Efficient route discovery in mobile ad hoc networks using encounter ages. In Proc. of ACM MobiHoc, 2003.
    • (2003) Proc. of ACM MobiHoc
    • Dubois-Ferriere, H.1    Grossglauser, M.2    Vetterli, M.3
  • 7
    • 6444221582 scopus 로고    scopus 로고
    • Building a reference combinatorial model for MANETs
    • A. Ferreira. Building a reference combinatorial model for MANETs. IEEE Network, 18(5):24-29, 2007.
    • (2007) IEEE Network , vol.18 , Issue.5 , pp. 24-29
    • Ferreira, A.1
  • 8
    • 51249107652 scopus 로고    scopus 로고
    • Space-time routing in wireless networks with predictable mobility
    • Technical Report GIT-CC-04-07, College of Computing, Georgia Institute of Technology
    • S. Merugu, M. Ammar, and E. Zegura. Space-time routing in wireless networks with predictable mobility. In Technical Report GIT-CC-04-07, College of Computing, Georgia Institute of Technology, 2004.
    • (2004)
    • Merugu, S.1    Ammar, M.2    Zegura, E.3
  • 9
    • 0742285890 scopus 로고    scopus 로고
    • Daknet: Rethinking connectivity in developing nations
    • A. Pentland, R. Fletcher, and A. Hasson. Daknet: Rethinking connectivity in developing nations. IEEE Computer, 37(1):78-83, 2004.
    • (2004) IEEE Computer , vol.37 , Issue.1 , pp. 78-83
    • Pentland, A.1    Fletcher, R.2    Hasson, A.3
  • 10
    • 39149143349 scopus 로고    scopus 로고
    • MORA routing and capacity building in disruption-tolerant networks
    • June
    • B. Burns, O. Brock, and B. Levine. MORA routing and capacity building in disruption-tolerant networks. Elsevier Ad hoc Networks Journal, 6(4):600-620, June 2008.
    • (2008) Elsevier Ad hoc Networks Journal , vol.6 , Issue.4 , pp. 600-620
    • Burns, B.1    Brock, O.2    Levine, B.3
  • 12
    • 34547699980 scopus 로고    scopus 로고
    • Spray and focus: Efficient mobility-assisted routing for heterogeneous and correlated mobility
    • T. Spyropoulos, K. Psounis, and C. S. Raghavendra. Spray and focus: Efficient mobility-assisted routing for heterogeneous and correlated mobility. In Proc. of IEEE PERCOM, 2007.
    • (2007) Proc. of IEEE PERCOM
    • Spyropoulos, T.1    Psounis, K.2    Raghavendra, C.S.3
  • 13
    • 34548321774 scopus 로고    scopus 로고
    • Detecting wormhole attacks in wireless networks using connectivity information
    • R. Maheshwari, J. Gao, and S. R. Das. Detecting wormhole attacks in wireless networks using connectivity information. In Proc. of IEEE INFOCOM, 2007.
    • (2007) Proc. of IEEE INFOCOM
    • Maheshwari, R.1    Gao, J.2    Das, S.R.3
  • 14
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proc. of ACM MobiCom, 2002.
    • (2002) Proc. of ACM MobiCom
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 16
    • 4544259841 scopus 로고    scopus 로고
    • Sector: Secure tracking of node encounters in multi-hop wireless networks
    • S. Capkun, L. Buttyan, and J. Hubaux. Sector: Secure tracking of node encounters in multi-hop wireless networks. In Proc. of ACM SASN, 2003.
    • (2003) Proc. of ACM SASN
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.3
  • 17
    • 39049116456 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • Y. Sun, Z. Han, W. Yu, and K. Liu. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proc. of IEEE INFOCOM, 2006.
    • (2006) Proc. of IEEE INFOCOM
    • Sun, Y.1    Han, Z.2    Yu, W.3    Liu, K.4
  • 18
    • 4143083800 scopus 로고    scopus 로고
    • A formal model for trust in dynamic networks
    • RS-03-4
    • M. Carbone, M. Nielsen, and V. Sassone. A formal model for trust in dynamic networks. In BRICS Report RS-03-4, 2003.
    • (2003) BRICS Report
    • Carbone, M.1    Nielsen, M.2    Sassone, V.3
  • 19
    • 2442597363 scopus 로고    scopus 로고
    • Performance analysis of the confidant protocol
    • S. Buchegger and J. Boudec. Performance analysis of the confidant protocol. In Proc. of ACM MobiHoc, pages 226-236, 2002.
    • (2002) Proc. of ACM MobiHoc , pp. 226-236
    • Buchegger, S.1    Boudec, J.2
  • 20
    • 85113133621 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • P. Michiardi and R. Molva. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Communications and Multimedia Security, pages 107-121, 2002.
    • (2002) Communications and Multimedia Security , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 21
    • 34548359282 scopus 로고    scopus 로고
    • Mobility reduces uncertainty in MANETs
    • F. Li and J. Wu. Mobility reduces uncertainty in MANETs. In Proc. of IEEE INFOCOM, 2007.
    • (2007) Proc. of IEEE INFOCOM
    • Li, F.1    Wu, J.2
  • 23
    • 37849034148 scopus 로고    scopus 로고
    • Surviving attacks on disruption-tolerant networks without authentication
    • J. Burgess, G. Bissias, M. Corner, and B. Levine. Surviving attacks on disruption-tolerant networks without authentication. In Proc. of ACM MobiHoc, 2007.
    • (2007) Proc. of ACM MobiHoc
    • Burgess, J.1    Bissias, G.2    Corner, M.3    Levine, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.