메뉴 건너뛰기




Volumn , Issue , 2009, Pages 753-758

Intelligent honeypot agent for blackhole attack detection in wireless mesh networks

Author keywords

AODV; Blackhole; Honey pots; Malicious; Spoofed; Wireless mesh networks

Indexed keywords

ATTACK DETECTION; BLACK HOLES; BLACKHOLE; DETECTION APPROACH; EXTENSIVE SIMULATIONS; HONEYPOTS; INTERNET GATEWAY; MESH ROUTERS; NS-2 SIMULATORS; OPEN ARCHITECTURE; ROUTE REQUESTS; WIRELESS MESH NETWORKING;

EID: 74249091486     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBHOC.2009.5336925     Document Type: Conference Paper
Times cited : (29)

References (21)
  • 1
    • 34548587732 scopus 로고    scopus 로고
    • N. Nandiraju, D. Nandiraju, L. Santhanam, B. He, 1. Wang, and D. P. Agrawal, Wireless mesh networks: current challenges and future directions of web-in-the-sky, in IEEE Communication, Aug.2007, l4, no.4 , pp. 2-12 .
    • N. Nandiraju, D. Nandiraju, L. Santhanam, B. He, 1. Wang, and D. P. Agrawal, "Wireless mesh networks: current challenges and future directions of web-in-the-sky," in IEEE Communication, Aug.2007, vol.l4, no.4 , pp. 2-12 .
  • 2
  • 6
    • 24144437206 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad hoc routing protocols
    • P. Ning and K. Sun, "How to misuse AODV: a case study of insider attacks against mobile ad hoc routing protocols," Ad Hoc Networks, vol. 3, no.6, pp. 795-819,2005.
    • (2005) Ad Hoc Networks , vol.3 , Issue.6 , pp. 795-819
    • Ning, P.1    Sun, K.2
  • 9
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
    • Y. Hu , D. B. John son, and A. Perrig , "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Ad Hoc Networks, 2003, pp.175-192.
    • (2003) Ad Hoc Networks , pp. 175-192
    • Hu, Y.1    John son, D.B.2    Perrig, A.3
  • 10
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y. Hu, A. Perrig, and D. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," In Proc. of ACM Mobicom, pp. 12-23, 2002 .
    • (2002) Proc. of ACM Mobicom , pp. 12-23
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3
  • 11
    • 74249105048 scopus 로고    scopus 로고
    • The Honeynet Project
    • The Honeynet Project, (http://www.honeynet.org/)
  • 12
    • 33746954566 scopus 로고    scopus 로고
    • Honeypot back-propagation for mitigating spoofing distributed Denial-of-service attacks
    • April
    • S. Khattab, R. Melhem, D. Mosse, and T. Znati , "Honeypot back-propagation for mitigating spoofing distributed Denial-of-service attacks," Journal of Parallel and Distributed Comp., vol. 66, pp. 11521164, April 2006.
    • (2006) Journal of Parallel and Distributed Comp , vol.66 , pp. 11521164
    • Khattab, S.1    Melhem, R.2    Mosse, D.3    Znati, T.4
  • 13
    • 1642516070 scopus 로고    scopus 로고
    • The Hone ynet Project: Trapping the Hackers
    • March
    • L. Spintzer, "The Hone ynet Project: Trapping the Hackers," IEEE Security and Privacy Magazine, vol . 1, no. 2, March 2003.
    • (2003) IEEE Security and Privacy Magazine , vol.1 , Issue.2
    • Spintzer, L.1
  • 17
    • 77953095994 scopus 로고    scopus 로고
    • M. A. -Shurman, S. -M. Yoo, and S. Park, Blackhole Attack in Mobile ad Hoc Networks, In Proceedings of ACM of 42nd annual South-East Confe rence Regional Conference, pp. 96-97,2004 .
    • M. A. -Shurman, S. -M. Yoo, and S. Park, " Blackhole Attack in Mobile ad Hoc Networks," In Proceedings of ACM of 42nd annual South-East Confe rence Regional Conference, pp. 96-97,2004 .
  • 18
    • 0036804761 scopus 로고    scopus 로고
    • Routing Security in Wireless Ad Hoc Net work
    • October
    • H. Deng, W. Li, and D. P. Agrawal, "Routing Security in Wireless Ad Hoc Net work," IEEE Communications Magazine, vol. 40, no. 10. October 2002.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10
    • Deng, H.1    Li, W.2    Agrawal, D.P.3
  • 20
    • 47849102250 scopus 로고    scopus 로고
    • Security-Lifetime tradeoffs for Wireless Sensor networks
    • IEEE, pp, Sept
    • Z. Karakehayov, "Security-Lifetime tradeoffs for Wireless Sensor networks," Emerging Technologies & Factory Automation, ETFA, IEEE, pp. 246-250, Sept. , 2007
    • (2007) Emerging Technologies & Factory Automation, ETFA , pp. 246-250
    • Karakehayov, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.