메뉴 건너뛰기




Volumn , Issue , 2010, Pages 51-57

New attacks and efficient countermeasures for multicast AODV

Author keywords

MAODV; Mobile ad hoc network (MANET); Mobile node (MN); Multicast routing attacks; Multicast routing protocol (MRP); Security techniques

Indexed keywords

MAODV; MOBILE NODES; MULTICAST ROUTING ATTACKS; MULTICAST ROUTING PROTOCOL (MRP); SECURITY TECHNIQUES;

EID: 79952756749     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HONET.2010.5715791     Document Type: Conference Paper
Times cited : (13)

References (23)
  • 1
    • 0012843946 scopus 로고    scopus 로고
    • Multicast ad hoc on-demand distance vector (maodv)
    • draft-ietf-manet-maodv-00.txt, July
    • E. M. Royer and C. E. Perkins, "Multicast ad hoc on-demand distance vector (maodv)," IETF Internet-Draft, draft-ietf-manet-maodv-00.txt, July 2000.
    • (2000) IETF Internet-Draft
    • Royer, E.M.1    Perkins, C.E.2
  • 4
    • 34548827597 scopus 로고    scopus 로고
    • A study of different types of attacks on multicast in mobile ad hoc networks
    • DOI 10.1016/j.adhoc.2006.07.005, PII S1570870506000709
    • H. L. Nguyen and U. T. Nguyen, "A study of different types of attacks on multicast in mobile ad hoc networks," Ad Hoc Netw., vol. 6, no. 1, pp. 32-46, 2008. (Pubitemid 47446449)
    • (2008) Ad Hoc Networks , vol.6 , Issue.1 , pp. 32-46
    • Nguyen, H.L.1    Nguyen, U.T.2
  • 5
    • 36849079903 scopus 로고    scopus 로고
    • A survey of routing attacks in mobile ad hoc networks
    • DOI 10.1109/MWC.2007.4396947
    • B. Kannhavong, H. Nakayama, N. Nemoto, Y amd Kato, and A. Jamalipour, "A survey of routing attacks in mobile ad hoc networks," Wireless Communications, IEEE, vol. 14, no. 1, pp. 85-91, 2007. (Pubitemid 350231658)
    • (2007) IEEE Wireless Communications , vol.14 , Issue.5 , pp. 85-91
    • Kannhavong, B.1    Nakayama, H.2    Nemoto, Y.3    Kato, N.4    Jamalipour, A.5
  • 7
    • 34548827597 scopus 로고    scopus 로고
    • A study of different types of attacks on multicast in mobile ad hoc networks
    • DOI 10.1016/j.adhoc.2006.07.005, PII S1570870506000709
    • H. L. Nguyen and U. T. Nguyen, "A study of different types of attacks on multicast in mobile ad hoc networks," Ad Hoc Netw., vol. 6, no. 1, pp. 32-46, 2008. (Pubitemid 47446449)
    • (2008) Ad Hoc Networks , vol.6 , Issue.1 , pp. 32-46
    • Nguyen, H.L.1    Nguyen, U.T.2
  • 10
    • 85083937286 scopus 로고    scopus 로고
    • Securing aodv against wormhole attacks in emergency manet multimedia communications
    • ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
    • E. A. Panaousis, L. Nazaryan, and C. Politis, "Securing aodv against wormhole attacks in emergency manet multimedia communications," in Mobimedia '09: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2009, pp. 1-7.
    • (2009) Mobimedia '09: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference , pp. 1-7
    • Panaousis, E.A.1    Nazaryan, L.2    Politis, C.3
  • 11
    • 36849010124 scopus 로고    scopus 로고
    • A survey of attacks and countermeasures in mobile ad hoc networks
    • X. Yang, S. Xuemin, and D. Ding-Zhu, "A survey of attacks and countermeasures in mobile ad hoc networks," Wireless Network Security, pp. 103-135, 2007.
    • (2007) Wireless Network Security , pp. 103-135
    • Yang, X.1    Xuemin, S.2    Ding-Zhu, D.3
  • 12
    • 47049105796 scopus 로고    scopus 로고
    • Geographic ad hoc routing security: Attacks and countermeasures
    • Z. Zhou and K. Yow, "Geographic ad hoc routing security: Attacks and countermeasures," Ad Hoc and Sensor Wireless Networks, vol. 1, no. 3, pp. 235-253, 2005.
    • (2005) Ad Hoc and Sensor Wireless Networks , vol.1 , Issue.3 , pp. 235-253
    • Zhou, Z.1    Yow, K.2
  • 13
    • 85083937286 scopus 로고    scopus 로고
    • Securing aodv against wormhole attacks in emergency manet multimedia communications
    • ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
    • E. A. Panaousis, L. Nazaryan, and C. Politis, "Securing aodv against wormhole attacks in emergency manet multimedia communications," in Mobimedia '09: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2009, pp. 1-7.
    • (2009) Mobimedia '09: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference , pp. 1-7
    • Panaousis, E.A.1    Nazaryan, L.2    Politis, C.3
  • 14
    • 39149132135 scopus 로고    scopus 로고
    • A secure group key management scheme for hierarchical mobile ad hoc networks
    • DOI 10.1016/j.adhoc.2007.04.006, PII S1570870507000959
    • D. Huang and D. Medhi, "A secure group key management scheme for hierarchical mobile ad hoc networks," Ad Hoc Netw., vol. 6, pp. 560-577, June 2008. [Online]. Available: http://portal.acm.org/citation.cfm?id=1346362. 1346636 (Pubitemid 351258393)
    • (2008) Ad Hoc Networks , vol.6 , Issue.4 , pp. 560-577
    • Huang, D.1    Medhi, D.2
  • 16
    • 60949084324 scopus 로고    scopus 로고
    • Bsmr: Byzantine-resilient secure multicast routing in multihop wireless networks
    • April. [Online]. Available
    • R. Curtmola and C. Nita-Rotaru, "Bsmr: Byzantine-resilient secure multicast routing in multihop wireless networks," IEEE Transactions on Mobile Computing, vol. 8, pp. 445-459, April 2009. [Online]. Available: http://dx.doi.org/10.1109/TMC.2008.134
    • (2009) IEEE Transactions on Mobile Computing , vol.8 , pp. 445-459
    • Curtmola, R.1    Nita-Rotaru, C.2
  • 20
    • 33745197327 scopus 로고    scopus 로고
    • Lhap: A lightweight network access control protocol for ad hoc networks
    • 46 DRDC Ottawa TM
    • S. Zhu, S. Xu, S. Setia, S. Jajodia, and O. way Key Chain, "Lhap: a lightweight network access control protocol for ad hoc networks," in Journal of Ad Hoc Networks, 2006. 46 DRDC Ottawa TM.
    • (2006) Journal of Ad Hoc Networks
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4    Way, O.5    Chain, K.6
  • 22
    • 58849162343 scopus 로고    scopus 로고
    • [Online]. Available
    • "Scalable networks." [Online]. Available: http://www.scalable- networks.com/products/qualnet/
    • Scalable Networks
  • 23
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • DOI 10.1007/s11276-004-4744-y
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," Wirel. Netw., vol. 11, no. 1-2, pp. 21-38, 2005. (Pubitemid 40536374)
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.