메뉴 건너뛰기




Volumn 25, Issue 1, 2011, Pages 30-34

Selective jamming/dropping insider attacks in wireless mesh networks

Author keywords

[No Author keywords available]

Indexed keywords

ARCHITECTURAL FEATURES; HIGH-SPEED; INSIDER ATTACK; INTERNAL ACCESS; SECURITY THREATS; WIRELESS CONNECTIVITIES;

EID: 79953786886     PISSN: 08908044     EISSN: None     Source Type: Journal    
DOI: 10.1109/MNET.2011.5687950     Document Type: Article
Times cited : (47)

References (15)
  • 1
    • 13844296355 scopus 로고    scopus 로고
    • Wireless mesh networks: A survey
    • DOI 10.1016/j.comnet.2004.12.001, PII S1389128604003457
    • I. F. Akyildiz, X. Wang, and W. Wang, "Wireless Mesh Networks: A Sur vey," Comp. Net., vol. 47, no. 4, 2005, pp. 445-87. (Pubitemid 40242422)
    • (2005) Computer Networks , vol.47 , Issue.4 , pp. 445-487
    • Akyildiz, I.F.1    Wang, X.2    Wang, W.3
  • 2
    • 79953793814 scopus 로고    scopus 로고
    • IEEE Std. P802.11s/D1.01
    • IEEE Std. P802.11s/D1.01, 2007; https://mentor.ieee.org/802.11/dcn/07/11- 07-0335-00-000s-tgs-redline-between-draft-d1-00-and-d1-01.pdf.
    • (2007)
  • 3
    • 77955388626 scopus 로고    scopus 로고
    • Selective jamming attacks in wireless networks
    • A. Proano and L. Lazos, "Selective Jamming Attacks in Wireless Networks," Proc. IEEE ICC, 2010.
    • (2010) Proc. IEEE ICC
    • Proano, A.1    Lazos, L.2
  • 4
  • 5
    • 4444307562 scopus 로고    scopus 로고
    • Multi-Channel MAC for Ad Hoc Networks: Handling multi-channel hidden terminals using a single transceiver
    • J. So and N. H. Vaidya, "Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals using a Single Transceiver," Proc. ACM MobiHoc, 2004, pp. 222-33.
    • (2004) Proc. ACM MobiHoc , pp. 222-33
    • So, J.1    Vaidya, N.H.2
  • 6
    • 44349085254 scopus 로고    scopus 로고
    • Probabilistic mitigation of control channel jamming via random key distribution
    • P. Tague, M. Li, and R. Poovendran, "Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution," Proc. PIMRC, 2007, pp. 1-5.
    • (2007) Proc. PIMRC , pp. 1-5
    • Tague, P.1    Li, M.2    Poovendran, R.3
  • 7
    • 70349111445 scopus 로고    scopus 로고
    • Mitigating control-channel jamming attacks in multi-channel ad hoc networks
    • L. Lazos, S. Liu, and M. Krunz, "Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks," Proc. 2nd ACM WiSec, 2009, pp. 169-80.
    • (2009) Proc. 2nd ACM WiSec , pp. 169-80
    • Lazos, L.1    Liu, S.2    Krunz, M.3
  • 8
    • 37749010823 scopus 로고    scopus 로고
    • Cross-Layer Jamming detection and mitigation in wireless broadcast networks
    • J. Chiang and Y.-C. Hu, "Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks," Proc. ACM MobiCom, 2007, pp. 346-49.
    • (2007) Proc. ACM MobiCom , pp. 346-49
    • Chiang, J.1    Hu, Y.-C.2
  • 10
    • 33947624156 scopus 로고    scopus 로고
    • An acknowledgment-based approach for the detection of routing misbehavior in MANETs
    • K. Liu et al., "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Trans. Mobile Comp., vol. 6, no. 5, 2007, pp. 536-50.
    • (2007) IEEE Trans. Mobile Comp. , vol.6 , Issue.5 , pp. 536-50
    • Liu, K.1
  • 11
    • 84885887137 scopus 로고    scopus 로고
    • Dealing with liars: Misbehavior identification via rényi-ulam games
    • Springer
    • W. Kozma and L. Lazos, "Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games," in Security and Privacy in Communication Networks, Springer, 2009, pp. 207-27.
    • (2009) Security and Privacy in Communication Networks , pp. 207-27
    • Kozma, W.1    Lazos, L.2
  • 12
    • 77956948315 scopus 로고    scopus 로고
    • A Survey of trust and reputation management systems in wireless communications
    • H. Yu et al., "A Survey of Trust and Reputation Management Systems in Wireless Communications," Proc. IEEE, vol. 98, no. 10, 2010, pp. 1755-72.
    • (2010) Proc. IEEE , vol.98 , Issue.10 , pp. 1755-72
    • Yu, H.1
  • 13
    • 34547532527 scopus 로고    scopus 로고
    • A secure incentive protocol for mobile ad hoc networks
    • DOI 10.1007/s11276-006-6220-3
    • Y. Zhang et al., "A Secure Incentive Protocol for Mobile Ad Hoc Networks," Wireless Net., vol. 13, no. 5, 2007, pp. 569-82. (Pubitemid 47185248)
    • (2007) Wireless Networks , vol.13 , Issue.5 , pp. 569-582
    • Zhang, Y.1    Lou, W.2    Liu, W.3    Fang, Y.4
  • 14
    • 50149105732 scopus 로고    scopus 로고
    • Impact of denial of service attacks on ad hoc networks
    • I. Aad, J.-P. Hubaux, and E. W. Knightly, "Impact of Denial of Service Attacks on Ad Hoc Networks," IEEE/ACM Trans. Net., vol. 16, no. 4, 2008, pp. 791-802.
    • (2008) IEEE/ACM Trans. Net. , vol.16 , Issue.4 , pp. 791-802
    • Aad, I.1    Hubaux, J.-P.2    Knightly, E.W.3
  • 15
    • 0035394785 scopus 로고    scopus 로고
    • ATCP: TCP for mobile ad hoc networks
    • J. Liu and S. Singh, "ATCP: TCP for Mobile Ad Hoc Networks," IEEE JSAC, vol. 19, no. 7, 2002, pp. 1300-15.
    • (2002) IEEE JSAC , vol.19 , Issue.7 , pp. 1300-15
    • Liu, J.1    Singh, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.