메뉴 건너뛰기




Volumn 9, Issue 1, 2012, Pages 101-114

Packet-hiding methods for preventing selective jamming attacks

Author keywords

denial of service; packet classification; Selective jamming; wireless networks

Indexed keywords

DENIAL-OF-SERVICE ATTACK; NETWORK LAYERS; NETWORK SECURITY; WIRELESS NETWORKS;

EID: 81455142735     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2011.41     Document Type: Article
Times cited : (91)

References (37)
  • 2
    • 33845635202 scopus 로고    scopus 로고
    • Wormhole-based antijamming techniques in sensor networks
    • DOI 10.1109/TMC.2007.250674
    • M. Cagalj, S. Capkun, and J.-P. Hubaux, "Wormhole-Based Anti-Jamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing, vol. 6, no. 1, pp. 100-114, Jan. 2007. (Pubitemid 44955817)
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.1 , pp. 100-114
    • Cagalj, M.1    Capkun, S.2    Hubaux, J.-P.3
  • 6
    • 78049349479 scopus 로고    scopus 로고
    • FPGA and ASIC implementations of AES
    • Springer
    • K. Gaj and P. Chodowiec, "FPGA and ASIC Implementations of AES," Cryptographic Engineering, pp. 235-294, Springer, 2009.
    • (2009) Cryptographic Engineering , pp. 235-294
    • Gaj, K.1    Chodowiec, P.2
  • 9
    • 0003580691 scopus 로고    scopus 로고
    • IEEE
    • IEEE, IEEE 802.11 Standard, http://standards.ieee.org/getieee802/ download/802.11-2007.pdf, 2007.
    • (2007) IEEE 802.11 Standard
  • 13
    • 18844450713 scopus 로고    scopus 로고
    • On link layer denial of service in data wireless LANs
    • May
    • G. Lin and G. Noubir, "On Link Layer Denial of Service in Data Wireless LANs," Wireless Comm. and Mobile Computing, vol. 5, no. 3, pp. 273-284, May 2004.
    • (2004) Wireless Comm. and Mobile Computing , vol.5 , Issue.3 , pp. 273-284
    • Lin, G.1    Noubir, G.2
  • 14
    • 34548295754 scopus 로고    scopus 로고
    • SPREAD: Foiling smart jammers using multi-layer agility
    • DOI 10.1109/INFCOM.2007.316, 4215898, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • X. Liu, G. Noubir, and R. Sundaram, "Spread: Foiling Smart Jammers Using Multi-Layer Agility," Proc. IEEE INFOCOM, pp. 2536-2540, 2007. (Pubitemid 47334516)
    • (2007) Proceedings - IEEE INFOCOM , pp. 2536-2540
    • Liu, X.1    Noubir, G.2    Sundaram, R.3    Tan, S.4
  • 15
    • 77953306472 scopus 로고    scopus 로고
    • Randomized differential DSSS: Jamming-resistant wireless broadcast communication
    • Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication," Proc. IEEE INFOCOM, 2010.
    • (2010) Proc. IEEE INFOCOM
    • Liu, Y.1    Ning, P.2    Dai, H.3    Liu, A.4
  • 16
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • R.C. Merkle, "Secure Communications over Insecure Channels," Comm. ACM, vol. 21, no. 4, pp. 294-299, 1978.
    • (1978) Comm. ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.C.1
  • 17
    • 29844445404 scopus 로고    scopus 로고
    • Low-Power DoS attacks in data wireless lans and countermeasures
    • G. Noubir and G. Lin, "Low-Power DoS Attacks in Data Wireless Lans and Countermeasures," Mobile Computing and Comm. Rev., vol. 7, no. 3, pp. 29-30, 2003.
    • (2003) Mobile Computing and Comm. Rev. , vol.7 , Issue.3 , pp. 29-30
    • Noubir, G.1    Lin, G.2
  • 18
    • 81455139065 scopus 로고    scopus 로고
    • OPNET
    • OPNET "OPNET Modeler 14.5," http://www.opnet.com/, 2011.
    • (2011) OPNET Modeler 14.5
  • 19
    • 65449120021 scopus 로고    scopus 로고
    • RFC 3561: Ad Hoc On-Demand Distance Vector (AODV) routing
    • C. Perkins, E. Belding-Royer, and S. Das, "RFC 3561: Ad Hoc On-Demand Distance Vector (AODV) Routing," Internet RFCs, 2003.
    • (2003) Internet RFCs
    • Perkins, C.1    Belding-Royer, E.2    Das, S.3
  • 21
    • 84947912552 scopus 로고    scopus 로고
    • All-or-Nothing Encryption and the Package Transform
    • Fast Software Encryption
    • R. Rivest, "All-or-Nothing Encryption and the Package Transform," Proc. Int'l Workshop Fast Software Encryption, pp. 210-218, 1997. (Pubitemid 127100717)
    • (1997) Lecture Notes In Computer Science , Issue.1267 , pp. 210-218
    • Rivest, R.L.1
  • 26
    • 0010137766 scopus 로고    scopus 로고
    • Something about All or Nothing (Transforms)
    • DOI 10.1023/A:1008304703074
    • D. Stinson, "Something about All or Nothing (Transforms)," Designs, Codes and Cryptography, vol. 22, no. 2, pp. 133-138, 2001. (Pubitemid 33672294)
    • (2001) Designs, Codes, and Cryptography , vol.22 , Issue.2 , pp. 133-138
    • Stinson, D.R.1
  • 31
    • 67651183943 scopus 로고    scopus 로고
    • Mitigation of control channel jamming under node capture attacks
    • Sept.
    • P. Tague, M. Li, and R. Poovendran, "Mitigation of Control Channel Jamming under Node Capture Attacks," IEEE Trans. Mobile Computing, vol. 8, no. 9, pp. 1221-1234, Sept. 2009.
    • (2009) IEEE Trans. Mobile Computing , vol.8 , Issue.9 , pp. 1221-1234
    • Tague, P.1    Li, M.2    Poovendran, R.3
  • 33
    • 51949113065 scopus 로고    scopus 로고
    • Intelligent jamming in wireless networks with applications to 802.11 b and other networks
    • D. Thuente and M. Acharya, "Intelligent Jamming in Wireless Networks with Applications to 802.11 b and Other Networks," Proc. IEEE Military Comm. Conf. (MILCOM), 2006.
    • (2006) Proc. IEEE Military Comm. Conf. (MILCOM)
    • Thuente, D.1    Acharya, M.2
  • 37
    • 11244260535 scopus 로고    scopus 로고
    • Channel surfing and spatial retreats: Defenses against wireless denial of service
    • Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
    • W. Xu, T. Wood, W. Trappe, and Y. Zhang, "Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service," Proc. Third ACM Workshop Wireless Security, pp. 80-89, 2004. (Pubitemid 40062798)
    • (2004) Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe , pp. 80-89
    • Xu, W.1    Wood, T.2    Trappe, W.3    Zhang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.