메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording

Author keywords

[No Author keywords available]

Indexed keywords

BLACK HOLES; DISRUPTION TOLERANT NETWORKS; EXTENSIVE SIMULATIONS; FALSE POSITIVE RATES; HIGH DETECTION RATE; INSIDER ATTACK; MISSION CRITICAL; MOBILITY MODEL; PACKET DELIVERY; PACKET EXCHANGE; ZEBRANET;

EID: 77955892916     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WOWMOM.2010.5534944     Document Type: Conference Paper
Times cited : (28)

References (11)
  • 6
    • 70349684505 scopus 로고    scopus 로고
    • Thwarting black hole attacks in distruption-tolerant networks using encounter tickets
    • F. Li, J. Wu, and A. Srinivasan, "Thwarting black hole attacks in distruption-tolerant networks using encounter tickets," in Infocom 2009, 2009.
    • (2009) Infocom 2009
    • Li, F.1    Wu, J.2    Srinivasan, A.3
  • 8
    • 77955047964 scopus 로고    scopus 로고
    • Muton: Detecting malicious nodes in disruption-tolerant networks
    • Y. Ren, M. C. Chuah, J. Yang, and Y. Chen, "Muton: Detecting malicious nodes in disruption-tolerant networks," in WCNC 2010, 2010.
    • (2010) WCNC 2010
    • Ren, Y.1    Chuah, M.C.2    Yang, J.3    Chen, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.