메뉴 건너뛰기




Volumn 7, Issue 4, 2010, Pages 410-423

Greedy receivers in IEEE 802.11 Hotspots: Impacts and detection

Author keywords

local area networks; Wireless communication

Indexed keywords

COMPUTATION THEORY; ELECTRICAL ENGINEERING; LOCAL AREA NETWORKS;

EID: 78149444755     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2010.2     Document Type: Article
Times cited : (9)

References (20)
  • 1
    • 50149105732 scopus 로고    scopus 로고
    • Impact of denial of service attacks on ad hoc networks
    • Aug
    • I. Aad, J. Hubaux, and E. Knightly, "Impact of Denial of Service Attacks on Ad Hoc Networks", IEEE/ACM Trans. Networking, vol. 16, no. 4, pp. 791-802, Aug. 2008.
    • (2008) IEEE/ACM Trans. Networking , vol.16 , Issue.4 , pp. 791-802
    • Aad, I.1    Hubaux, J.2    Knightly, E.3
  • 2
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Aug
    • J. Bellardo and S. Savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions", Proc. 12th USENIX Security Symp., Aug. 2003.
    • (2003) Proc. 12th USENIX Security Symp.
    • Bellardo, J.1    Savage, S.2
  • 4
    • 78149448948 scopus 로고    scopus 로고
    • Click
    • Click, http://pdos.csail.mit.edu/click/, 2010.
    • (2010)
  • 7
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad Hoc routing
    • special issue on making wireless work, May
    • Y. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing", IEEE Security and Privacy, special issue on making wireless work, vol. 2, no. 3, pp. 28-39, May 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.1    Perrig, A.2
  • 8
    • 78149455980 scopus 로고    scopus 로고
    • In-stat, http://www.in-stat.com/catalog/Wcatalogue.asp?id=167, 2010.
    • (2010)
  • 10
    • 0036957872 scopus 로고    scopus 로고
    • Analysis of a campus-wide wireless network
    • Sept
    • D. Kotz and K. Essien, "Analysis of a Campus-Wide Wireless Network", Proc. ACM MOBICOM, Sept. 2002.
    • (2002) Proc. ACM MOBICOM
    • Kotz, D.1    Essien, K.2
  • 11
    • 8344224137 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks (the shrew versus the mice and elephants)
    • Aug
    • A. Kuzmanovic and E. Knightly, "Low-Rate TCP-Targeted Denial of Service Attacks (the Shrew versus the Mice and Elephants)", Proc. ACM SIGCOMM, Aug. 2003.
    • (2003) Proc. ACM SIGCOMM
    • Kuzmanovic, A.1    Knightly, E.2
  • 12
    • 36048989292 scopus 로고    scopus 로고
    • Detection and handling of MAC layer misbehavior in wireless networks
    • Apr
    • P. Kyasanur and N. Vaidya, "Detection and Handling of MAC Layer Misbehavior in Wireless Networks", IEEE Trans. Mobile Computing, Apr. 2004.
    • (2004) IEEE Trans. Mobile Computing
    • Kyasanur, P.1    Vaidya, N.2
  • 14
    • 33750825847 scopus 로고    scopus 로고
    • DOMINO: Detecting mac layer greedy behavior in IEEE 802.11 hotspots
    • Dec
    • M. Raya, I. Aad, J. P. Hubaux, and A. E. Fawal, "DOMINO: Detecting Mac Layer Greedy Behavior in IEEE 802.11 Hotspots", IEEE Trans. Mobile Computing, vol. 5, no. 12, pp. 1691-1705, Dec. 2006.
    • (2006) IEEE Trans. Mobile Computing , vol.5 , Issue.12 , pp. 1691-1705
    • Raya, M.1    Aad, I.2    Hubaux, J.P.3    Fawal, A.E.4
  • 15
    • 4544324338 scopus 로고    scopus 로고
    • DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots
    • Sept
    • M. Raya, J. P. Hubaux, and I. Aad, "DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots", Proc. MobiSys, Sept. 2004.
    • (2004) Proc. MobiSys
    • Raya, M.1    Hubaux, J.P.2    Aad, I.3
  • 18
    • 33749540300 scopus 로고    scopus 로고
    • Internet packet size distributions: Some observations
    • USC/Information Sciences Inst., May
    • R. Sinha, C. Papadopoulos, and J. Heidemann, "Internet Packet Size Distributions: Some Observations", Technical Report ISI-TR-2007-643, USC/Information Sciences Inst., May 2007.
    • (2007) Technical Report ISI-TR-2007-643
    • Sinha, R.1    Papadopoulos, C.2    Heidemann, J.3
  • 19
    • 0034539052 scopus 로고    scopus 로고
    • Analysis of a local-area wireless network
    • Sept
    • D. Tang, "Analysis of a Local-Area Wireless Network", Proc. MOBICOM, Sept. 2000.
    • (2000) Proc. MOBICOM
    • Tang, D.1
  • 20
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • May
    • W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks", Proc. ACM MobiHoc, May 2005.
    • (2005) Proc. ACM MobiHoc
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.