메뉴 건너뛰기




Volumn , Issue , 2009, Pages 13-22

Exception triggered DoS attacks on wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

DOS ATTACKS; EAP-TLS; EAP-TTLS; MOBILE IPV6; NS-2 SIMULATIONS; RETURN ROUTABILITY; SECURITY PROTOCOLS; WIRELESS LAN;

EID: 70449878083     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2009.5270358     Document Type: Conference Paper
Times cited : (7)

References (32)
  • 1
    • 84860751282 scopus 로고    scopus 로고
    • Aircrack-ng. http://aircrack-ng.org.
    • Aircrack-ng
  • 4
    • 70449902091 scopus 로고    scopus 로고
    • MIPL: Mobile ipv6 for linux. http://www.mipl.mediapoli.com/.
    • MIPL: Mobile ipv6 for linux. http://www.mipl.mediapoli.com/.
  • 7
    • 70449742684 scopus 로고    scopus 로고
    • IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999.
    • IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999.
  • 8
    • 70449755601 scopus 로고    scopus 로고
    • Microsoft PEAP version 0
    • Microsoft PEAP version 0, 2002. http://www.watersprings.org/pub/id/draft- kamath-pppext-peapv0-00.txt.
    • (2002)
  • 11
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • J. Bellardo and S. Savage. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX Security Symposium, 2003.
    • (2003) USENIX Security Symposium
    • Bellardo, J.1    Savage, S.2
  • 13
    • 70449902079 scopus 로고    scopus 로고
    • T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346, Apr. 2006
    • T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346, Apr. 2006.
  • 17
    • 55849140761 scopus 로고    scopus 로고
    • A defense against worm-hole attacks in wireless network
    • Y. Hu, A. Perrig, and D. J. P. leashes. A defense against worm-hole attacks in wireless network. In IEEE Infocom, 2003.
    • (2003) IEEE Infocom
    • Hu, Y.1    Perrig, A.2    leashes, D.J.P.3
  • 23
  • 24
    • 70449820217 scopus 로고    scopus 로고
    • A poisoning-resilient tcp stack
    • Beijing, China
    • A. Mondal and A. Kuzmanovic. A poisoning-resilient tcp stack. In IEEE ICNP 2007, Beijing, China, 2007.
    • (2007) IEEE ICNP 2007
    • Mondal, A.1    Kuzmanovic, A.2
  • 27
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31, 1999.
    • (1999) Computer Networks , vol.31
    • Paxson, V.1
  • 31
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In MobiHoc, 2005.
    • (2005) MobiHoc
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 32
    • 70449782785 scopus 로고    scopus 로고
    • Exception trigged dos attacks on wireless networks
    • Technical Report NWU-EECS-08-13, Univ. of Northwestern, Dec
    • Y. Zhao, S. Vemuri, J. Chen, Y. Chen, H. Zhou, and Z. J. Fu. Exception trigged dos attacks on wireless networks. Technical Report NWU-EECS-08-13, Univ. of Northwestern, Dec. 2008. http://cs.northwestern.edu/~yzhao/.
    • (2008)
    • Zhao, Y.1    Vemuri, S.2    Chen, J.3    Chen, Y.4    Zhou, H.5    Fu, Z.J.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.