메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Robust sybil detection for MANETs

Author keywords

[No Author keywords available]

Indexed keywords

ERROR RATE; FALSE POSITIVE; MALICIOUS NODES; MOBILE NODES; NETWORK SIZE; SYBIL ATTACK; TRUE POSITIVE;

EID: 70449107634     PISSN: 10952055     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCCN.2009.5235387     Document Type: Conference Paper
Times cited : (24)

References (15)
  • 1
    • 0012578409 scopus 로고
    • Distance-bounding protocols (extended abstract)
    • S. Brands and D. Chaum. Distance-bounding protocols (extended abstract). In Proc. Eurocrypt, 1993.
    • (1993) Proc. Eurocrypt
    • Brands, S.1    Chaum, D.2
  • 2
    • 3042520226 scopus 로고    scopus 로고
    • Report on a working session on security in wireless ad hoc network
    • Jan.
    • L. Buttyan and J. Hubaux. Report on a working session on security in wireless ad hoc network. ACM Mobile Computing and Communications Review, 7(1):74-94, Jan. 2003.
    • (2003) ACM Mobile Computing and Communications Review , vol.7 , Issue.1 , pp. 74-94
    • Buttyan, L.1    Hubaux, J.2
  • 4
    • 4544304744 scopus 로고    scopus 로고
    • The sybil attack
    • Cambridge, MA, March
    • J. R. Douceur. The sybil attack. In Proc. IPTPS, Cambridge, MA, March 2002.
    • (2002) Proc. IPTPS
    • Douceur, J.R.1
  • 5
  • 7
    • 3042785862 scopus 로고    scopus 로고
    • The sybil attack in sensor networks : Analysis & defenses
    • Berkeley, Apr.
    • J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks : Analysis & defenses. In Proc. IPSN'04, Berkeley, Apr. 2004.
    • (2004) Proc. IPSN'04
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 11
    • 70449132432 scopus 로고    scopus 로고
    • Sybil attack detection based on RSSI for wireless sensor network
    • Sept.
    • J. Wang, G. Yang, Y. Sun, and S. Chen. Sybil attack detection based on RSSI for wireless sensor network. In Proc. WiCom, Sept. 2007.
    • (2007) Proc. WiCom
    • Wang, J.1    Yang, G.2    Sun, Y.3    Chen, S.4
  • 14
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks
    • February
    • Y. Zhang, W. Liu, and W. Lou. Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in Communications, 24(2):247-255, February 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 247-255
    • Zhang, Y.1    Liu, W.2    Lou, W.3
  • 15
    • 50249168206 scopus 로고    scopus 로고
    • Privacypreserving detection of sybil attacks in vehicular ad hoc networks
    • Philadelphia
    • T. Zhou, R. R. Choudhury, P. Ning, and K. Chakrabarty. Privacypreserving detection of sybil attacks in vehicular ad hoc networks. In Proc. MobiQuitous, Philadelphia, 2007.
    • (2007) Proc. MobiQuitous
    • Zhou, T.1    Choudhury, R.R.2    Ning, P.3    Chakrabarty, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.