메뉴 건너뛰기




Volumn , Issue , 2011, Pages

The modeling and comparison of wireless network denial of service attacks

Author keywords

[No Author keywords available]

Indexed keywords

DENIAL OF SERVICE ATTACKS; HANDHELDS; IEEE 802.11S; NETWORK DENIAL OF SERVICE; ROBUST PROTOCOL; SAFETY CRITICAL APPLICATIONS; WIRELESS ACCESS; WIRELESS PROTOCOL;

EID: 81055155451     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2043106.2043113     Document Type: Conference Paper
Times cited : (15)

References (22)
  • 1
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Berkeley, CA, USA USENIX Association
    • Bellardo, J., and Savage, S. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In Proceedings of the 12th USENIX Security Symposium (Berkeley, CA, USA, 2003), USENIX Association.
    • (2003) Proceedings of the 12th USENIX Security Symposium
    • Bellardo, J.1    Savage, S.2
  • 4
    • 67650679649 scopus 로고    scopus 로고
    • Analysis of mobile WiMAX security: Vulnerabilities and solutions
    • MASS 2008. 5th IEEE International Conference on
    • Han, T., Zhang, N., Liu, K., Tang, B., and Liu, Y. Analysis of mobile WiMAX security: Vulnerabilities and solutions. In Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008. 5th IEEE International Conference on (2008), pp. 828-833.
    • (2008) Mobile Ad Hoc and Sensor Systems, 2008 , pp. 828-833
    • Han, T.1    Zhang, N.2    Liu, K.3    Tang, B.4    Liu, Y.5
  • 5
    • 0242581943 scopus 로고    scopus 로고
    • Spin model checker
    • first ed. Addison-Wesley Professional
    • Holzmann, G. Spin model checker, the: primer and reference manual, first ed. Addison-Wesley Professional, 2003.
    • (2003) The: Primer and Reference Manual
    • Holzmann, G.1
  • 6
    • 21644460506 scopus 로고    scopus 로고
    • IEEE New York, NY, USA
    • IEEE. IEEE Std 802.11g-2003. New York, NY, USA, 2003.
    • (2003) IEEE Std 802.11g-2003
  • 13
    • 28144444844 scopus 로고    scopus 로고
    • Game-based analysis of denial-of-service prevention protocols
    • Proceedings of the 18th IEEE Computer Security Foundations Workshop
    • Mahimkar, A., and Shmatikov, V. Game-based analysis of denial-of-service prevention protocols. In Proceedings of the 18th IEEE workshop on Computer Security Foundations (Washington, DC, USA, 2005), IEEE Computer Society, pp. 287-301. (Pubitemid 41696436)
    • (2005) Proceedings of the Computer Security Foundations Workshop , pp. 287-301
    • Mahimkar, A.1    Shmatikov, V.2
  • 16
    • 0032664157 scopus 로고    scopus 로고
    • A formal framework and evaluation method for network denial of service
    • Meadows, C. A formal framework and evaluation method for network denial of service. IEEE Computer Security Foundations Workshop 00 (1999), 4.
    • (1999) IEEE Computer Security Foundations Workshop , pp. 4
    • Meadows, C.1
  • 17
    • 46249123717 scopus 로고    scopus 로고
    • Automatic vulnerability checking of IEEE 802.16 WiMAX protocols through TLA+
    • 2nd IEEE Workshop on
    • Narayana, P., Chen, R., Zhao, Y., Chen, Y., Fu, Z., and Zhou, H. Automatic vulnerability checking of IEEE 802.16 WiMAX protocols through TLA+. In Secure Network Protocols, 2006. 2nd IEEE Workshop on (2006), pp. 44-49.
    • (2006) Secure Network Protocols, 2006 , pp. 44-49
    • Narayana, P.1    Chen, R.2    Zhao, Y.3    Chen, Y.4    Fu, Z.5    Zhou, H.6
  • 19
    • 28144453915 scopus 로고    scopus 로고
    • Analyzing DoS-resistance of protocols using a cost-based framework
    • Ramachandran, V. Analyzing DoS-resistance of protocols using a cost-based framework. Tech. rep., Yale University, 2002.
    • (2002) Tech. Rep., Yale University
    • Ramachandran, V.1
  • 20
    • 62149116869 scopus 로고    scopus 로고
    • Network access security in next-generation 3GPP systems: A tutorial
    • IEEE
    • Sankaran, C. Network access security in next-generation 3GPP systems: A tutorial. Communications Magazine, IEEE 47, 2 (2009), 84-91.
    • (2009) Communications Magazine , vol.47 , Issue.2 , pp. 84-91
    • Sankaran, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.