메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Side channel monitoring: Packet drop attack detection in wireless ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

DATA-COMMUNICATION; DETECTION RATES; DETECTION TECHNIQUE; DISCONNECTIVITY; EN-ROUTE; MALICIOUS PACKETS; MESSAGE FORWARDING; MONI-TORING NODES; NETWORK ATTACK; NETWORK SCENARIO; PACKET DROP ATTACK; SECURITY STRENGTHS; SIDE-CHANNEL; SOURCE NODES;

EID: 80052176023     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icc.2011.5963331     Document Type: Conference Paper
Times cited : (18)

References (15)
  • 1
    • 50149105732 scopus 로고    scopus 로고
    • Impact of Denial of Service Attacks on Ad Hoc Networks
    • I. Aad, J.-P. Hubaux, and E.W. Knightly, "Impact of Denial of Service Attacks on Ad Hoc Networks". IEEE Trans. on Networking, 16(4):791-802, 2008.
    • (2008) IEEE Trans. on Networking , vol.16 , Issue.4 , pp. 791-802
    • Aad, I.1    Hubaux, J.-P.2    Knightly, E.W.3
  • 3
    • 33845666617 scopus 로고    scopus 로고
    • Inner-circle consistency for wireless ad hoc networks
    • DOI 10.1109/TMC.2007.250670
    • C. Basile, Z. Kalbarczyk, and R.K. Lyer, "Inner-circle consistency for wireless ad hoc networks". IEEE Trans. on Mobile Computing, 6(1):39-55, 2007. (Pubitemid 44955813)
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.1 , pp. 39-55
    • Basile, C.1    Kalbarczyk, Z.2    Iyer, R.K.3
  • 4
    • 77954342948 scopus 로고    scopus 로고
    • An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network
    • J. Cai, P. Yi, J. Chen, Z. Wang, and N. Liu, "An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network". In Proc. of IEEE AINA, 2010.
    • (2010) Proc. of IEEE AINA
    • Cai, J.1    Yi, P.2    Chen, J.3    Wang, Z.4    Liu, N.5
  • 5
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in wireless ad hoc networks
    • DOI 10.1109/MCOM.2002.1039859
    • H. Deng, W. Li, and D.P. Agrawal, "Routing security in wireless ad hoc networks". IEEE Communications Magazine, 40(10):70-75, 2002. (Pubitemid 35311948)
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 70-75
    • Deng, H.1    Li, W.2    Agrawal, D.P.3
  • 6
    • 70349161605 scopus 로고    scopus 로고
    • REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits
    • W. Kozma Jr. and L. Lazos, "REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits". In Proc. of ACM WiSec, pp. 103-110, 2009.
    • (2009) Proc. of ACM WiSec , pp. 103-110
    • Kozma Jr., W.1    Lazos, L.2
  • 7
    • 34548048170 scopus 로고    scopus 로고
    • Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
    • S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, "Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method". Int'l J. of Network Security, 5(3):338-346, 2007.
    • (2007) Int'l J. of Network Security , vol.5 , Issue.3 , pp. 338-346
    • Kurosawa, S.1    Nakayama, H.2    Kato, N.3    Jamalipour, A.4    Nemoto, Y.5
  • 8
    • 33947624156 scopus 로고    scopus 로고
    • An Acknowledgment Based Approach for the Detection of Routing Misbehavior in MANETs
    • K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, "An Acknowledgment Based Approach for the Detection of Routing Misbehavior in MANETs". IEEE Trans. on Mobile Computing, 6(5):536-550, 2007.
    • (2007) IEEE Trans. on Mobile Computing , vol.6 , Issue.5 , pp. 536-550
    • Liu, K.1    Deng, J.2    Varshney, P.3    Balakrishnan, K.4
  • 9
    • 82555196697 scopus 로고    scopus 로고
    • BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
    • to appear
    • R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks". IEEE Trans. on Parallel and Distributed Systems, to appear.
    • IEEE Trans. on Parallel and Distributed Systems
    • Lu, R.1    Lin, X.2    Zhu, H.3    Liang, X.4    Shen, X.5
  • 11
    • 84944714533 scopus 로고    scopus 로고
    • Collaborative security architecture for blackhole attack prevention in mobile ad hoc networks
    • A. Patcha and A. Mishra, "Collaborative security architecture for blackhole attack prevention in mobile ad hoc networks". In Proc. of RAWCON, pp. 75-78, 2003.
    • (2003) Proc. of RAWCON , pp. 75-78
    • Patcha, A.1    Mishra, A.2
  • 12
    • 77952986444 scopus 로고    scopus 로고
    • Secure Data collection in wireless sensor networks using randomized dispersive routes
    • T. Shu, M. Krunz, and S. Liu, "Secure Data collection in wireless sensor networks using randomized dispersive routes". IEEE Trans. on Mobile Computing, 9(7):941-954, 2010.
    • (2010) IEEE Trans. on Mobile Computing , vol.9 , Issue.7 , pp. 941-954
    • Shu, T.1    Krunz, M.2    Liu, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.