메뉴 건너뛰기




Volumn , Issue , 2010, Pages 775-780

An adaptive approach to detecting black and gray hole attacks in ad hoc network

Author keywords

Ad hoc; Black hole; Cross layer design; DSR; Gray hole; Intrusion detection

Indexed keywords

ADAPTIVE APPROACH; ADAPTIVE THRESHOLDS; BLACK HOLE; BLACK HOLES; COLLISION RATE; CONTROL PACKETS; CROSS-LAYER DESIGN; DETECTION RATES; DSR PROTOCOL; EFFICIENT ALGORITHM; ESTIMATE DYNAMICS; FALSE POSITIVE RATES; IN-NETWORK; MAC LAYER; NETWORK OVERLOADS; NEXT-HOP; PATH-BASED; REPORTING SYSTEMS; SIMULATION TOOL; SYSTEM RESOURCES;

EID: 77954342948     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2010.143     Document Type: Conference Paper
Times cited : (57)

References (16)
  • 1
    • 33748943051 scopus 로고    scopus 로고
    • IETF MANET work group. http://www.ietf.org/dyn/wg/charter/manetcharter. html.
    • IETF MANET Work Group
  • 2
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks[J]
    • L. D. Zhou; Z. J. Haas, Securing ad hoc Networks[J], IEEE Network, 13(6), 1999.
    • (1999) IEEE Network , vol.13 , Issue.6
    • Zhou, L.D.1    Haas, Z.J.2
  • 3
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing[J]
    • May
    • Y. C. Hu; A. Perrig, A Survey of Secure Wireless ad hoc Routing[J], IEEE Security and Privacy, 2(3), 28-39, May 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.C.1    Perrig, A.2
  • 4
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in wireless Ah Hoc networks[J]
    • IEEE
    • H. Deng; W. Li; D. Agrawal, (2002). Routing Security in Wireless Ah Hoc Networks[J]. Communications Magazine, IEEE, 70-75.
    • (2002) Communications Magazine , pp. 70-75
    • Deng, H.1    Li, D.2    Agrawal, D.3
  • 6
    • 73149103936 scopus 로고    scopus 로고
    • The simulation and comparison of routing attacks on DSR protocol[C]
    • Press
    • J. W. Cai; P. Yi, Y. Tian, Y. K. Zhou, N. Liu, The Simulation and Comparison of Routing Attacks on DSR Protocol[C], WiCOM 2009, in press.
    • WiCOM 2009
    • Cai, J.W.1    Yi, P.2    Tian, Y.3    Zhou, Y.K.4    Liu, N.5
  • 8
    • 84944714533 scopus 로고    scopus 로고
    • Collaborative security architecture for black hole attack prevention in mobile ad hoc networks[C]
    • A. Patcha; A. Mishra; Collaborative security architecture for black hole attack prevention in mobile ad hoc networks[C]; Radio and Wireless Conference, 2003, 75-78.
    • (2003) Radio and Wireless Conference , pp. 75-78
    • Patcha, A.1    Mishra, A.2
  • 12
    • 27844590384 scopus 로고    scopus 로고
    • A survey on wireless mesh networks[J]
    • I. F. Akyildiz; X. Wang (2005). A Survey on Wireless Mesh Networks[J]. IEEE Communications Magazine, 43 (9), 23-30.
    • (2005) IEEE Communications Magazine , vol.43 , Issue.9 , pp. 23-30
    • Akyildiz, I.F.1    Wang, X.2
  • 16
    • 15244358870 scopus 로고    scopus 로고
    • Resisting malicious packet dropping in wireless ad hoc networks
    • Oct
    • M. Just; E. Kranakis; T. Wan. "Resisting Malicious Packet Dropping In Wireless ad hoc Networks. " In Proc. ADHOC-NOW, Oct. 2003.
    • (2003) Proc. ADHOC-NOW
    • Just, M.1    Kranakis, E.2    Wan, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.