메뉴 건너뛰기




Volumn 10, Issue 8, 2011, Pages 1096-1112

Stealthy attacks in wireless ad hoc networks: Detection and countermeasure

Author keywords

Local monitoring; misrouting; multihop wireless networks; packet dropping; transmission power control

Indexed keywords

LOCAL MONITORING; MISROUTING; MULTIHOP WIRELESS NETWORKS; PACKET DROPPING; TRANSMISSION POWER CONTROL;

EID: 79959526891     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2010.249     Document Type: Article
Times cited : (54)

References (39)
  • 2
    • 2442597363 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in distributed ad-hoc NeTworks
    • S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes-Fairness in Distributed Ad-Hoc NeTworks," Proc. ACM MobiHoc, pp. 80-91, 2002.
    • (2002) Proc. ACM MobiHoc , pp. 80-91
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 5
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y.C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," Proc. IEEE INFOCOM, pp. 1976-986, 2003.
    • (2003) Proc. IEEE INFOCOM , pp. 1976-986
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 6
  • 7
    • 37549006809 scopus 로고    scopus 로고
    • MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks
    • May
    • I. Khalil, S. Bagchi, and N.B. Shroff, "MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks," Ad Hoc Networks, vol. 6, no. 3, pp. 344-362, May 2008.
    • (2008) Ad Hoc Networks , vol.6 , Issue.3 , pp. 344-362
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3
  • 8
    • 70349743699 scopus 로고    scopus 로고
    • UNMASK: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks
    • I. Khalil, S. Bagchi, C. Nina-Rotaru, and N. Shroff, "UNMASK: Utilizing Neighbor Monitoring for Attack Mitigation in Multihop Wireless Sensor Networks," Ad Hoc Networks, vol. 8, no. 2, pp. 148-164, 2010.
    • (2010) Ad Hoc Networks , vol.8 , Issue.2 , pp. 148-164
    • Khalil, I.1    Bagchi, S.2    Nina-Rotaru, C.3    Shroff, N.4
  • 9
    • 0034844688 scopus 로고    scopus 로고
    • Split multipath routing with maximally disjoint paths in Ad hoc networks
    • S.J. Lee and M. Gerla, "Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks," Proc. IEEE Int'l Conf. Comm. (ICC '01), pp. 3201-3205, 2001. (Pubitemid 32796984)
    • (2001) IEEE International Conference on Communications , vol.10 , pp. 3201-3205
    • Lee, S.-J.1    Gerla, M.2
  • 15
  • 16
    • 0001341422 scopus 로고    scopus 로고
    • The dynamic source routing protocol for multihop wireless ad hoc networks
    • Addison-Wesley
    • D. Johnson, D. Maltz, and J. Broch, "The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks," Ad Hoc Networking, Addison-Wesley, 2001.
    • (2001) Ad Hoc Networking
    • Johnson, D.1    Maltz, D.2    Broch, J.3
  • 19
    • 85031307530 scopus 로고
    • Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
    • C.E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," ACM SIGCOMM Computer Comm. Rev., vol. 24, pp. 234-244, 1994.
    • (1994) ACM SIGCOMM Computer Comm. Rev. , vol.24 , pp. 234-244
    • Perkins, C.E.1    Bhagwat, P.2
  • 20
    • 79959493247 scopus 로고    scopus 로고
    • "The Network Simulator - ns-2," http://www.isi.edu/nsnam/ns, 2011.
    • (2011)
  • 22
    • 33747378828 scopus 로고    scopus 로고
    • Jamming attack detection and countermeasures in wireless sensor network using ant system
    • R. Muraleedharan and L.A. Osadciw, "Jamming Attack Detection and Countermeasures in Wireless Sensor Network Using Ant System," Proc. Wireless Sensing and Processing, vol. 6248, p. 62480G, 2006.
    • (2006) Proc. Wireless Sensing and Processing , vol.6248
    • Muraleedharan, R.1    Osadciw, L.A.2
  • 24
    • 36048983204 scopus 로고    scopus 로고
    • SLAM: Sleep-wake aware local monitoring in sensor networks
    • DOI 10.1109/DSN.2007.88, 4273007, Proceedings - 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007
    • I. Khalil, S. Bagchi, and N. Shroff, "SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks," Proc. 37th Ann. IEEE/IFIP Int'l Conf. Dependable Systems and Networks (DSN '07), pp. 565-574, June 2007. (Pubitemid 350080461)
    • (2007) Proceedings of the International Conference on Dependable Systems and Networks , pp. 565-574
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3
  • 29
    • 25844459081 scopus 로고    scopus 로고
    • A dynamic adaptive acknowledgment strategy for TCP over multihop wireless networks
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • R. de Oliveira and T. Braun, "A Dynamic Adaptive Acknowledgment Strategy for TCP over Multihop Wireless Networks," Proc. IEEE INFOCOM, pp. 1863-1874, 2005. (Pubitemid 41390699)
    • (2005) Proceedings - IEEE INFOCOM , vol.3 , pp. 1863-1874
    • De Oliveira, R.1    Braun, T.2
  • 32
    • 79959502121 scopus 로고    scopus 로고
    • http://www.xbow.com/products/Product-pdf-files/-Wireless-pdf/ MICA2-Datasheet.pdf, 2011.
    • (2011)
  • 37
    • 44849093503 scopus 로고    scopus 로고
    • Reputation-based framework for high integrity sensor networks
    • 10.1145/1362542.1362546, May
    • S. Ganeriwal, L.K. Balzano, and M.B. Srivastava, "Reputation-Based Framework for High Integrity Sensor Networks," ACM Trans. Sensor Networks, vol. 4, no. 3, pp. 1-37, http://doi.acm.org/10.1145/1362542.1362546, May 2008.
    • (2008) ACM Trans. Sensor Networks , vol.4 , Issue.3 , pp. 1-37
    • Ganeriwal, S.1    Balzano, L.K.2    Srivastava, M.B.3
  • 39
    • 33947624156 scopus 로고    scopus 로고
    • An acknowledgment-based approach for the detection of routing misbehavior in MANETs
    • May
    • K. Liu, J. Deng, P.K. Varshney, and K. Balakrishnan, "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 536-550, May 2007.
    • (2007) IEEE Trans. Mobile Computing , vol.6 , Issue.5 , pp. 536-550
    • Liu, K.1    Deng, J.2    Varshney, P.K.3    Balakrishnan, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.