메뉴 건너뛰기




Volumn 9, Issue 5, 2010, Pages 1661-1675

Mitigating selective forwarding attacks with a channel-aware approach in WMNS

Author keywords

Channel aware detection; Gray hole attack; Optimal detection threshold; Selective forwarding attack; Wireless mesh network

Indexed keywords

ATTACK DETECTION; CHANNEL AWARE; CHANNEL LOSS; CHANNEL QUALITY; DENIAL OF SERVICE ATTACKS; FALSE ALARMS; GRAY HOLE ATTACK; LOSS RATES; MEDIUM ACCESS; MESH ROUTERS; MISSED DETECTIONS; OPTIMAL DETECTION; PACKET DROPPING; TRAFFIC MONITORING; WIRELESS CHANNEL;

EID: 77952255404     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2010.05.090700     Document Type: Article
Times cited : (56)

References (45)
  • 1
    • 27844590384 scopus 로고    scopus 로고
    • A survey on wireless mesh networks
    • Sept.
    • I. F. Akyildiz and X. Wang, "A survey on wireless mesh networks," IEEE Commun. Mag., vol.43, no.9, pp. S23-S30, Sept. 2005.
    • (2005) IEEE Commun. Mag. , vol.43 , Issue.9
    • Akyildiz, I.F.1    Wang, X.2
  • 3
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • Sept.
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Elsevier's AdHoc Networks J., vol.1, no.2-3, pp. 293-315, Sept. 2003.
    • (2003) Elsevier's AdHoc Networks J. , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 4
    • 34548852836 scopus 로고    scopus 로고
    • CHEMAS: Identify suspect nodes in selective forwarding attacks
    • Nov.
    • B. Xiao, B. Yu, and C. Gao, "CHEMAS: identify suspect nodes in selective forwarding attacks," J. Parallel and Distrib. Computing, vol.67, no.11, pp. 1218-1230, Nov. 2007.
    • (2007) J. Parallel and Distrib. Computing , vol.67 , Issue.11 , pp. 1218-1230
    • Xiao, B.1    Yu, B.2    Gao, C.3
  • 10
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • July
    • Y. Hu, D. B. Johnson, and A. Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks," Ad Hoc Networks, vol.1, no.1, pp. 175-192, July 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.1    Johnson, D.B.2    Perrig, A.3
  • 11
    • 33846602719 scopus 로고    scopus 로고
    • Trust modeling and evaluation in ad hoc networks
    • Dec.
    • Y. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Trust modeling and evaluation in ad hoc networks," in Proc. IEEE GLOBECOM '05, vol.3, Dec. 2005.
    • (2005) Proc. IEEE GLOBECOM '05 , vol.3
    • Sun, Y.1    Yu, W.2    Han, Z.3    Liu, K.J.R.4
  • 13
    • 39049116456 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • Apr.
    • Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu, "A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks," in Proc. INFOCOM, 2006, pp. 1-13, Apr. 2006.
    • (2006) Proc. INFOCOM 2006 , pp. 1-13
    • Sun, Y.L.1    Han, Z.2    Yu, W.3    Liu, K.J.R.4
  • 16
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y. Hu, D. B. Johnson, and A. Perrig, "Ariadne: a secure on-demand routing protocol for ad hoc networks," in Proc. Mobicom'02, pp. 12-23, 2002.
    • (2002) Proc. Mobicom'02 , pp. 12-23
    • Hu, Y.1    Johnson, D.B.2    Perrig, A.3
  • 18
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Mar.
    • Y. Hu, D. B. Johnson, and A. Perrig, "Packet leashes: a defense against wormhole attacks in wireless networks," in Proc. IEEE INFOCOM 2003, vol.3, pp. 1976-1986, Mar. 2003.
    • (2003) Proc. IEEE INFOCOM 2003 , vol.3 , pp. 1976-1986
    • Hu, Y.1    Johnson, D.B.2    Perrig, A.3
  • 21
    • 34249339428 scopus 로고    scopus 로고
    • Securing cooperative ad-hoc networks under noise and imperfect monitoring: Strategies and game theoretic analysis
    • June
    • W. Yu, Z. Ji, and K. J. R. Liu, "Securing cooperative ad-hoc networks under noise and imperfect monitoring: strategies and game theoretic analysis," IEEE Trans. Inf. Forensics and Security, vol.2, no.2, pp. 240-253, June 2007.
    • (2007) IEEE Trans. Inf. Forensics and Security , vol.2 , Issue.2 , pp. 240-253
    • Yu, W.1    Ji, Z.2    Liu, K.J.R.3
  • 22
    • 2442519150 scopus 로고    scopus 로고
    • Locationcentric isolation of misbehavior and trust routing in energy-constrained sensor networks
    • S. Tanachaiwiwat, P. Dave, R. Bhindwale, and A. Helmy, "Locationcentric isolation of misbehavior and trust routing in energy-constrained sensor networks," in Proc. IEEE IPCCC, pp. 463-469, 2004.
    • (2004) Proc. IEEE IPCCC , pp. 463-469
    • Tanachaiwiwat, S.1    Dave, P.2    Bhindwale, R.3    Helmy, A.4
  • 23
    • 24744432675 scopus 로고    scopus 로고
    • Self-policing mobile ad hoc networks by reputation systems
    • July
    • S. Buchegger and J. Y. Le Boudee, "Self-policing mobile ad hoc networks by reputation systems," IEEE Commun. Mag., vol.43, no.7, pp. 101-107, July 2005.
    • (2005) IEEE Commun. Mag. , vol.43 , Issue.7 , pp. 101-107
    • Buchegger, S.1    Le Boudee, J.Y.2
  • 24
    • 77951567609 scopus 로고    scopus 로고
    • Channel-aware detection of gray hole attacks in wireless mesh networks
    • submitted
    • D. Manikantan Shila, Y. Cheng, and T. Anjali, "Channel-aware detection of gray hole attacks in wireless mesh networks," in Proc. GLOBECOM, 2009, submitted.
    • (2009) Proc. GLOBECOM
    • Manikantan Shila, D.1    Cheng, Y.2    Anjali, T.3
  • 25
    • 0000266745 scopus 로고
    • Shared generation of authentication and signatures
    • Berlin
    • Y. Desmedt and Y. Frankel, "Shared generation of authentication and signatures," Advances in Cryptology (CRYPTO'91), Berlin, pp. 457-469, 1991.
    • (1991) Advances in Cryptology (CRYPTO'91) , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 26
    • 3042785862 scopus 로고    scopus 로고
    • Sybil attack in sensor networks: Analysis and defenses
    • New York
    • J. Newsome, E. Shi, D. Song, and A. Perrig, "Sybil attack in sensor networks: analysis and defenses," in Proc. IPSN '04, New York, pp. 259-268, 2004.
    • (2004) Proc. IPSN '04 , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 27
    • 37849019002 scopus 로고    scopus 로고
    • Detecting the sybil attacks in mobile ad hoc networks
    • C. Piro, C. Shields, and B. N. Levine, "Detecting the sybil attacks in mobile ad hoc networks," in Proc. SecureComm, 2006.
    • (2006) Proc. SecureComm
    • Piro, C.1    Shields, C.2    Levine, B.N.3
  • 29
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and network defense policies in wireless sensor networks
    • Anchorage, AK, May
    • L. Mingyan, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks," in Proc. IEEE INFOCOM 2007, pp. 1307-1315, Anchorage, AK, May 2007.
    • (2007) Proc. IEEE INFOCOM 2007 , pp. 1307-1315
    • Mingyan, L.1    Koutsopoulos, I.2    Poovendran, R.3
  • 32
    • 77952282266 scopus 로고    scopus 로고
    • Secure remote management and software distribution for wireless mesh networks
    • Santander, Spain, May
    • T. Staub, D. Balsiger, M. Lustenberger, and T. Braun, "Secure remote management and software distribution for wireless mesh networks," in Proc. ASWN, Santander, Spain, May 2007, pp. 4754.
    • (2007) Proc. ASWN , pp. 4754
    • Staub, T.1    Balsiger, D.2    Lustenberger, M.3    Braun, T.4
  • 33
    • 0142002511 scopus 로고    scopus 로고
    • The Elliptic Curve Digital Signature Algorithm (ECDSA)
    • Aug.
    • D. Johnson, A. Menezes, and S. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)," International J. Inf. Security, vol.1, no.1, pp. 36-63, Aug. 2001.
    • (2001) International J. Inf. Security , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2    Vanstone, S.3
  • 34
    • 50049106991 scopus 로고    scopus 로고
    • Adaptive FECbased packet loss resilience scheme for supporting voice communication over ad hoc wireless networks
    • V. R. Gandikota, B. R Tamma, and C. S. R. Murthy, "Adaptive FECbased packet loss resilience scheme for supporting voice communication over ad hoc wireless networks," IEEE Trans. Mobile Comput., vol.7, no.10, pp. 1184-1199, 2008.
    • (2008) IEEE Trans. Mobile Comput. , vol.7 , Issue.10 , pp. 1184-1199
    • Gandikota, V.R.1    Tamma, B.R.2    Murthy, C.S.R.3
  • 35
    • 0842311059 scopus 로고    scopus 로고
    • Sensitivity of wireless network simulations to a two-state Markov model channel approximation
    • Dec.
    • S. Miller and J. McDougall, "Sensitivity of wireless network simulations to a two-state Markov model channel approximation," in Proc. IEEE GLOBECOM, vol.2, no.1, pp. 697-701, Dec. 2003.
    • (2003) Proc. IEEE GLOBECOM , vol.2 , Issue.1 , pp. 697-701
    • Miller, S.1    McDougall, J.2
  • 37
    • 29144503071 scopus 로고    scopus 로고
    • How well can the IEEE 802.11 wireless LAN support quality of service?
    • Nov.
    • H. Zhai, X. Chen, and Y. Fang, "How well can the IEEE 802.11 wireless LAN support quality of service?" IEEE Trans. Wireless Commun., vol.4, no.6, pp. 3084-3094, Nov. 2005.
    • (2005) IEEE Trans. Wireless Commun. , vol.4 , Issue.6 , pp. 3084-3094
    • Zhai, H.1    Chen, X.2    Fang, Y.3
  • 38
    • 0033749075 scopus 로고    scopus 로고
    • Performance analysis of the IEEE 802.11 distributed coordination function
    • Mar.
    • G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordination function," IEEE J. Sel. Areas Commun., vol.18, no.3, pp. 535-547, Mar. 2000.
    • (2000) IEEE J. Sel. Areas Commun. , vol.18 , Issue.3 , pp. 535-547
    • Bianchi, G.1
  • 44
    • 70450252084 scopus 로고    scopus 로고
    • On TCP throughput and window size in a multihop wireless network testbed
    • Sep., Montral, Quebec, Canada
    • D. Koutsonikolas, J. Dyaberi, P. Garimella, S. Fahmy, and Y. C. Hu, "On TCP throughput and window size in a multihop wireless network testbed," in Proc. WiNTECH07, Sep. 2007, Montral, Quebec, Canada.
    • (2007) Proc. WiNTECH07
    • Koutsonikolas, D.1    Dyaberi, J.2    Garimella, P.3    Fahmy, S.4    Hu, Y.C.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.