메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

ANALYTICAL MODEL; BLACK HOLES; CHANNEL ERROR; MALICIOUS PACKETS; MONI-TORING NODES; SECURITY ATTACKS; WORMHOLE ATTACK;

EID: 70449491089     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2009.5198910     Document Type: Conference Paper
Times cited : (35)

References (20)
  • 1
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," Wirel. Netw., vol. 11, no. 1-2, pp. 21-38, 2005.
    • (2005) Wirel. Netw , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 2
    • 27844524055 scopus 로고    scopus 로고
    • Design of an effective lossdistinguishable mac protocol for 802.11 wlan
    • Sep
    • Q. Pang, S. Liew, and V. Leung, "Design of an effective lossdistinguishable mac protocol for 802.11 wlan," Communications Letters, IEEE, vol. 9, no. 9, pp. 781-783, Sep 2005.
    • (2005) Communications Letters, IEEE , vol.9 , Issue.9 , pp. 781-783
    • Pang, Q.1    Liew, S.2    Leung, V.3
  • 4
    • 33947166189 scopus 로고    scopus 로고
    • Novel collision detection scheme and its applications for ieee 802.11 wireless lans
    • 2007
    • J.-H. Yun and S.-W. Seo, "Novel collision detection scheme and its applications for ieee 802.11 wireless lans," Computer Communications, vol. 30, no. 6, pp. 1350-1366, -2007-.
    • Computer Communications , vol.30 , Issue.6 , pp. 1350-1366
    • Yun, J.-H.1    Seo, S.-W.2
  • 5
    • 33947627591 scopus 로고    scopus 로고
    • Mac layer channel quality measurement in 802.11
    • Feb
    • D. Malone, P. Clifford, and D. J. Leith, "Mac layer channel quality measurement in 802.11," Communications Letters, IEEE, vol. 11, no. 2, pp. 143-145, Feb. 2007.
    • (2007) Communications Letters, IEEE , vol.11 , Issue.2 , pp. 143-145
    • Malone, D.1    Clifford, P.2    Leith, D.J.3
  • 6
    • 0142218930 scopus 로고    scopus 로고
    • M. Just, E. Kranakis, and T. Wan, Resisting malicious packet dropping in wireless ad hoc networks, in In Proc. of ADHOCNOW03. Springer Verlag, 2003, pp. 151-163.
    • M. Just, E. Kranakis, and T. Wan, "Resisting malicious packet dropping in wireless ad hoc networks," in In Proc. of ADHOCNOW03. Springer Verlag, 2003, pp. 151-163.
  • 8
    • 38049004945 scopus 로고    scopus 로고
    • Detection of packet forwarding misbehavior in mobile ad-hoc networks
    • WWIC, F. Boavida, E. Monteiro, S. Mascolo, and Y. Koucheryavy, Eds, Springer, Online, Available
    • O. F. Gonzalez, M. P. Howarth, and G. Pavlou, "Detection of packet forwarding misbehavior in mobile ad-hoc networks." in WWIC, ser. Lecture Notes in Computer Science, F. Boavida, E. Monteiro, S. Mascolo, and Y. Koucheryavy, Eds., vol. 4517. Springer, 2007, pp. 302-314. [Online]. Available: http://dblp.uni-trier.de/db/conf/wwic/wwic2007.html#GonzalezHP07
    • (2007) ser. Lecture Notes in Computer Science , vol.4517 , pp. 302-314
    • Gonzalez, O.F.1    Howarth, M.P.2    Pavlou, G.3
  • 9
    • 36448934185 scopus 로고    scopus 로고
    • On loss differentiation for csma-based dense wireless network
    • November
    • H. Ma, J. Zhu, and S. Roy, "On loss differentiation for csma-based dense wireless network," Communications Letters, IEEE, vol. 11, no. 11, pp. 877-879, November 2007.
    • (2007) Communications Letters, IEEE , vol.11 , Issue.11 , pp. 877-879
    • Ma, H.1    Zhu, J.2    Roy, S.3
  • 12
    • 33845762444 scopus 로고    scopus 로고
    • Detecting ieee 802.11 mac layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
    • S. Radosavac, A. A. Cárdenas, J. S. Baras, and G. V. Moustakides, "Detecting ieee 802.11 mac layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers," J. Comput. Secur., vol. 15, no. 1, pp. 103-128, 2007.
    • (2007) J. Comput. Secur , vol.15 , Issue.1 , pp. 103-128
    • Radosavac, S.1    Cárdenas, A.A.2    Baras, J.S.3    Moustakides, G.V.4
  • 14
    • 0033749075 scopus 로고    scopus 로고
    • Performance analysis of the ieee 802.11 distributed coordination function
    • Mar
    • G. Bianchi, "Performance analysis of the ieee 802.11 distributed coordination function," Selected Areas in Communications, IEEE Journal on, vol. 18, no. 3, pp. 535-547, Mar 2000.
    • (2000) Selected Areas in Communications, IEEE Journal on , vol.18 , Issue.3 , pp. 535-547
    • Bianchi, G.1
  • 18
    • 24944468457 scopus 로고    scopus 로고
    • A performance analysis of the 802.11 wireless lan medium access control
    • N. Gupta and P. R. Kumar, "A performance analysis of the 802.11 wireless lan medium access control," Communications in Information and Systems, vol. 3, no. 4, pp. 279-304, 2004.
    • (2004) Communications in Information and Systems , vol.3 , Issue.4 , pp. 279-304
    • Gupta, N.1    Kumar, P.R.2
  • 19
    • 70449509066 scopus 로고    scopus 로고
    • 802.11 markov channel modeling,
    • Ph.D. dissertation, School of Information Sciences, University of Pittsburgh
    • J. N. Arauz, "802.11 markov channel modeling," Ph.D. dissertation, School of Information Sciences, University of Pittsburgh, 2004.
    • (2004)
    • Arauz, J.N.1
  • 20
    • 34548046194 scopus 로고    scopus 로고
    • Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks
    • K.-F. Ssu, C.-H. Chou, and L.-W. Cheng, "Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks," Comput. Commun., vol. 30, no. 11-12, pp. 2342-2352, 2007.
    • (2007) Comput. Commun , vol.30 , Issue.11-12 , pp. 2342-2352
    • Ssu, K.-F.1    Chou, C.-H.2    Cheng, L.-W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.