메뉴 건너뛰기




Volumn 2, Issue 1, 2009, Pages 45-54

Crosscheck mechanism to identify malicious nodes in ad hoc networks

Author keywords

Mobile ad hoc networks (MANETs); Secure routing protocols

Indexed keywords

CRIME; INTERNET PROTOCOLS; INTRUSION DETECTION; MOBILE SECURITY; NETWORK ROUTING; NETWORK SECURITY; ROUTING PROTOCOLS;

EID: 77956474272     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.52     Document Type: Article
Times cited : (4)

References (27)
  • 1
    • 0742294233 scopus 로고    scopus 로고
    • Mobile ad hoc networking: Imperatives and challenges
    • Chlamtac I, Conti M, Liu JJ-N. Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks 2003; 1(1): 13-64.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 13-64
    • Chlamtac, I.1    Conti, M.2    Liu, J.J.-N.3
  • 2
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues, and open problems
    • Anonymity 2000
    • Raymond J-F. Traffic analysis: protocols, attacks, design issues, and open problems. In Anonymity 2000, LNCS 2009, 2001; pp. 10-29.
    • (2001) LNCS , vol.2009 , pp. 10-29
    • Raymond, J.-F.1
  • 3
    • 85008543309 scopus 로고    scopus 로고
    • Provably secure on-demand source routing in mobile ad hoc networks
    • Acs G, Buttyán L, Vajda I. Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing 2006; 5(11): 1533-1546.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.11 , pp. 1533-1546
    • Acs, G.1    Buttyán, L.2    Vajda, I.3
  • 4
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Hu Y-C, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless Networks 2005; 11(1-2): 21-38.
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 13
    • 27544485427 scopus 로고    scopus 로고
    • Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts
    • May
    • Goodrich MT. Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts. In Proceedings of IEEE Symposium on Security and Privacy, May 2005; pp. 196-207.
    • (2005) Proceedings of IEEE Symposium on Security and Privacy , pp. 196-207
    • Goodrich, M.T.1
  • 15
    • 85071707831 scopus 로고    scopus 로고
    • IEEE Computer Society LAN/MAN Standards Committee. Part 11: Wireless LAN, medium access control (MAC) and physical layer (PHY) specifications. Standard ANSI/IEEE 802.11, IEEE, Inc., 1999.
    • IEEE Computer Society LAN/MAN Standards Committee. Part 11: Wireless LAN, medium access control (MAC) and physical layer (PHY) specifications. Standard ANSI/IEEE 802.11, IEEE, Inc., 1999.
  • 18
    • 85071700774 scopus 로고    scopus 로고
    • Dierks T, Allen C. The TLS protocol version 1.0. RFC 2246, January 1999
    • Dierks T, Allen C. The TLS protocol version 1.0. RFC 2246, January 1999.
  • 20
    • 84943553152 scopus 로고    scopus 로고
    • Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
    • Zhu S, Xu S, Setia S, Jajodia S. Establishing pair-wise keys for secure communication in ad hoc networks: a probabilistic approach. In Proceedings of IEEE ICNP, 2003.
    • (2003) Proceedings of IEEE ICNP
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4
  • 24
    • 0003417978 scopus 로고    scopus 로고
    • Glomosim: A scalable network simulation environment, v2.03
    • Los Angeles, CA, December
    • Zeng X, Bagrodia R, Gerla M. Glomosim: a scalable network simulation environment, v2.03. Parallel Computing Lab, UC Los Angeles, CA, December 2000.
    • (2000) Parallel Computing Lab, UC
    • Zeng, X.1    Bagrodia, R.2    Gerla, M.3
  • 25
    • 25644450392 scopus 로고    scopus 로고
    • Perfect simulation and stationarity of a class of mobility models
    • Le Boudec J-Y, Vojnovic M. Perfect simulation and stationarity of a class of mobility models. In Proceedings of IEEE INFOCOM, 2005; pp. 2743-2754.
    • (2005) Proceedings of IEEE INFOCOM , pp. 2743-2754
    • Le Boudec, J.-Y.1    Vojnovic, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.