메뉴 건너뛰기




Volumn , Issue , 2010, Pages 7-12

Implementation and evaluation of accountability using flow-net in wireless networks

Author keywords

Accountability; Logging; Media access control (MAC); Routing; Trace; Wireless networks

Indexed keywords

ACCOUNTABILITY; LOGGING; MEDIA ACCESS CONTROL (MAC); ROUTING; TRACE;

EID: 79951647755     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2010.5680278     Document Type: Conference Paper
Times cited : (13)

References (51)
  • 1
    • 33746368048 scopus 로고    scopus 로고
    • Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks
    • July
    • B. Sun, F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, "Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks," IEEE Transactions on Vehicular Technology, Vol. 55, No. 4, July 2006, pp.1385-1396.
    • (2006) IEEE Transactions on Vehicular Technology , vol.55 , Issue.4 , pp. 1385-1396
    • Sun, B.1    Yu, F.2    Wu, K.3    Xiao, Y.4    Leung, V.C.M.5
  • 2
    • 33745689203 scopus 로고    scopus 로고
    • Accountability in Electronic Commerce Protocols
    • May
    • R. Kailar, "Accountability in Electronic Commerce Protocols," IEEE Transactions on Software Engineering, vol. 22, no. 5, pp. 313-328, May, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.5 , pp. 313-328
    • Kailar, R.1
  • 7
    • 0039334688 scopus 로고    scopus 로고
    • The security architecture formerly known as stack inspection: A security mechanism for language-based systems
    • Oct.
    • D. S. Wallach, A. W. Appel, and E. W. Felten, "The security architecture formerly known as stack inspection: A security mechanism for language-based systems," ACM Transactions on Software Engineering and Methodology, vol. 9, no. 4, pp. 341-378, Oct. 2000.
    • (2000) ACM Transactions on Software Engineering and Methodology , vol.9 , Issue.4 , pp. 341-378
    • Wallach, D.S.1    Appel, A.W.2    Felten, E.W.3
  • 9
    • 1942433797 scopus 로고    scopus 로고
    • Digital Rights Management {and, or, vs.} the Law
    • April
    • P. Samuelson, "Digital Rights Management {and, or, vs.} the Law," Communications of the ACM, vol. 46, no. 4, pp. 41-45, April 2003.
    • (2003) Communications of the ACM , vol.46 , Issue.4 , pp. 41-45
    • Samuelson, P.1
  • 10
    • 0027668428 scopus 로고
    • Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
    • Sept.
    • P. Helman, G. Liepins, "Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse," IEEE Transactions on Software Engineering, vol. 19, no. 9, pp. 886-901, Sept., 1993.
    • (1993) IEEE Transactions on Software Engineering , vol.19 , Issue.9 , pp. 886-901
    • Helman, P.1    Liepins, G.2
  • 12
    • 42649088128 scopus 로고    scopus 로고
    • Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
    • Apr.
    • Y. Xiao, "Accountability for wireless LANs, ad hoc networks, and wireless mesh networks," IEEE Communications Magazine, Vol. 46, No. 4, Apr. 2008, pp.116-126.
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 116-126
    • Xiao, Y.1
  • 13
    • 70350068836 scopus 로고    scopus 로고
    • Retrieving knowledge from auditing log-files for computer and network forensics and accountability
    • Feb.
    • D. Takahashi and Y. Xiao, "Retrieving knowledge from auditing log-files for computer and network forensics and accountability," Security and Communication Networks, Vol. 1, No. 2, Feb. 2008, pp. 147-160.
    • (2008) Security and Communication Networks , vol.1 , Issue.2 , pp. 147-160
    • Takahashi, D.1    Xiao, Y.2
  • 14
  • 15
    • 70350060199 scopus 로고    scopus 로고
    • Flow-Net Methodology for Accountability in Wireless Networks
    • Sept./Oct.
    • Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks," IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
    • (2009) IEEE Network , vol.23 , Issue.5 , pp. 30-37
    • Xiao, Y.1
  • 16
    • 79951614060 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/Promiscuous-mode
  • 17
    • 79951623832 scopus 로고    scopus 로고
    • http://www.wireshark.org/
  • 21
    • 85016433011 scopus 로고    scopus 로고
    • Efficient multicast stream authentication for the fully adversarial network model
    • C. Tartary and H. Wang, "Efficient multicast stream authentication for the fully adversarial network model," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 175-191, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 175-191
    • Tartary, C.1    Wang, H.2
  • 22
  • 23
    • 79951648076 scopus 로고    scopus 로고
    • LIP: A lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
    • H. Hsu, S. Zhu, and A. R. Hurson, "LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 202-215, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 202-215
    • Hsu, H.1    Zhu, S.2    Hurson, A.R.3
  • 26
    • 68149086398 scopus 로고    scopus 로고
    • Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
    • K. Hoeper and G. Gong, "Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 239-250, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 239-250
    • Hoeper, K.1    Gong, G.2
  • 27
    • 38049042723 scopus 로고    scopus 로고
    • On security proof of McCullagh-Barreto's key agreement protocol and its variants
    • Z. Cheng and L. Chen, "On security proof of McCullagh-Barreto's key agreement protocol and its variants," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 251-259, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 251-259
    • Cheng, Z.1    Chen, L.2
  • 29
    • 66249092571 scopus 로고    scopus 로고
    • Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
    • D. Huang, "Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 272-283, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 272-283
    • Huang, D.1
  • 32
    • 84899740998 scopus 로고    scopus 로고
    • Visualisation of wormholes in underwater sensor networks: A distributed approach
    • W. Wang, J. Kong, B. Bhargava, and M. Gerla, " Visualisation of wormholes in underwater sensor networks: a distributed approach," International Journal of Security and Networks, Vol. 3, No. 1, pp. 10-23, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 10-23
    • Wang, W.1    Kong, J.2    Bhargava, B.3    Gerla, M.4
  • 33
    • 85086420396 scopus 로고    scopus 로고
    • Syntax vs. semantics: Competing approaches to dynamic network intrusion detection
    • W. Scheirer and M. Chuah, "Syntax vs. semantics: competing approaches to dynamic network intrusion detection," International Journal of Security and Networks, Vol. 3, No. 1, pp. 24-35, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 24-35
    • Scheirer, W.1    Chuah, M.2
  • 35
    • 79951619296 scopus 로고    scopus 로고
    • A novel Conference Key Management solution for Secure Dynamic Conferencing
    • X. Zou and Y. Karandikar, " A novel Conference Key Management solution for Secure Dynamic Conferencing," International Journal of Security and Networks, Vol. 3, No. 1, pp. 47-53, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 47-53
    • Zou, X.1    Karandikar, Y.2
  • 37
    • 79951662876 scopus 로고    scopus 로고
    • Towards a realistic testbed for wireless network reliability and security performance studies
    • F. Hu, A. Rughoonundon, and L. Celentano, " Towards a realistic testbed for wireless network reliability and security performance studies," International Journal of Security and Networks, Vol. 3, No. 1, pp. 63-77, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 63-77
    • Hu, F.1    Rughoonundon, A.2    Celentano, L.3
  • 39
    • 77955714466 scopus 로고    scopus 로고
    • Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
    • I. Ray and N. Poolsappasit, "Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents," International Journal of Security and Networks, Vol. 3, No. 2, pp. 80-94, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 80-94
    • Ray, I.1    Poolsappasit, N.2
  • 43
    • 51849141536 scopus 로고    scopus 로고
    • A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
    • X. Lin, X. Ling, H. Zhu, P. Ho, and X. Shen, "A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks," International Journal of Security and Networks, Vol. 3, No. 2, pp. 122-132, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 122-132
    • Lin, X.1    Ling, X.2    Zhu, H.3    Ho, P.4    Shen, X.5
  • 45
    • 62249216277 scopus 로고    scopus 로고
    • Formal modelling and analysis of XML firewall for service-oriented systems
    • H. Xu, M. Ayachit, and A. Reddyreddy, "Formal modelling and analysis of XML firewall for service-oriented systems," International Journal of Security and Networks, Vol. 3, No. 3, pp. 147-160, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 147-160
    • Xu, H.1    Ayachit, M.2    Reddyreddy, A.3
  • 47
    • 77954327354 scopus 로고    scopus 로고
    • PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks
    • F. Li, A. Srinivasan, and J. Wu, "PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks," International Journal of Security and Networks, Vol. 3, No. 3, pp. 173-182, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 173-182
    • Li, F.1    Srinivasan, A.2    Wu, J.3
  • 48
    • 79951647154 scopus 로고    scopus 로고
    • Verifying security protocols by knowledge analysis
    • X. Ma and X. Cheng, "Verifying security protocols by knowledge analysis," International Journal of Security and Networks, Vol. 3, No. 3, pp. 183-192, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 183-192
    • Ma, X.1    Cheng, X.2
  • 49
    • 72549101766 scopus 로고    scopus 로고
    • An agent-based framework for intrusion detection alert verification and event correlation
    • B. Uphoff and J. S. Wong, "An agent-based framework for intrusion detection alert verification and event correlation," International Journal of Security and Networks, Vol. 3, No. 3, pp. 193-200, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 193-200
    • Uphoff, B.1    Wong, J.S.2
  • 50
    • 79951661564 scopus 로고    scopus 로고
    • Secure user-identification and key distribution scheme preserving anonymity
    • S. Tripathy and S. Nandi, " Secure user-identification and key distribution scheme preserving anonymity," International Journal of Security and Networks, Vol. 3, No. 3, pp. 201-205, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 201-205
    • Tripathy, S.1    Nandi, S.2
  • 51
    • 77952481544 scopus 로고    scopus 로고
    • ID-based threshold proxy signcryption scheme from bilinear pairings
    • F. Li, X. Xin, and Y. Hu, " ID-based threshold proxy signcryption scheme from bilinear pairings," International Journal of Security and Networks, Vol. 3, No. 3, pp. 206-215, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 206-215
    • Li, F.1    Xin, X.2    Hu, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.