메뉴 건너뛰기




Volumn 9, Issue 2, 2012, Pages 250-260

Risk-aware mitigation for MANET routing attacks

Author keywords

dempster shafer theory; intrusion response; Mobile ad hoc networks; risk aware

Indexed keywords

COMPUTATION THEORY; ELECTRICAL ENGINEERING;

EID: 84856298337     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2011.51     Document Type: Article
Times cited : (44)

References (34)
  • 1
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Feb.
    • Y. Sun, W. Yu, Z. Han, and K. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 305-317, Feb. 2006.
    • (2006) IEEE J. Selected Areas in Comm. , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.1    Yu, W.2    Han, Z.3    Liu, K.4
  • 2
    • 77950319889 scopus 로고    scopus 로고
    • Adaptation of reputation management systems to dynamic network conditions in ad hoc networks
    • May
    • M. Refaei, L. Da Silva, M. Eltoweissy, and T. Nadeem, "Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks," IEEE Trans. Computers, vol. 59, no. 5, pp. 707-719, May 2010.
    • (2010) IEEE Trans. Computers , vol.59 , Issue.5 , pp. 707-719
    • Refaei, M.1    Da Silva, L.2    Eltoweissy, M.3    Nadeem, T.4
  • 6
    • 33748594201 scopus 로고    scopus 로고
    • An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
    • DOI 10.2753/MIS0742-1222220405
    • L. Sun, R. Srivastava, and T. Mock, "An Information Systems Security Risk Assessment Model under the Dempster-Shafer Theory of Belief Functions," J. Management Information Systems, vol. 22, no. 4, pp. 109-142, 2006. (Pubitemid 44377673)
    • (2006) Journal of Management Information Systems , vol.22 , Issue.4 , pp. 109-142
    • Sun, L.1    Srivastava, R.P.2    Mock, T.J.3
  • 9
    • 0003146466 scopus 로고
    • Review of a mathematical theory of evidence
    • L. Zadeh, "Review of a Mathematical Theory of Evidence," AI Magazine, vol. 5, no. 3, p. 81, 1984.
    • (1984) AI Magazine , vol.5 , Issue.3 , pp. 81
    • Zadeh, L.1
  • 10
    • 0023311178 scopus 로고
    • On the dempster-shafer framework and new combination rules
    • DOI 10.1016/0020-0255(87)90007-7
    • R. Yager, "On the Dempster-Shafer Framework and New Combination Rules 1," Information Sciences, vol. 41, no. 2, pp. 93-137, 1987. (Pubitemid 17583474)
    • (1987) Information sciences , vol.41 , Issue.2 , pp. 93-137
    • Yager Ronald, R.1
  • 14
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in wireless ad hoc networks
    • DOI 10.1109/MCOM.2002.1039859
    • H. Deng, W. Li, and D. Agrawal, "Routing Security in Wireless Ad Hoc Networks," IEEE Comm. Magazine, vol. 40, no. 10, pp. 70-75, Oct. 2002. (Pubitemid 35311948)
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 70-75
    • Deng, H.1    Li, W.2    Agrawal, D.P.3
  • 15
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May/June
    • Y. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security and Privacy Magazine, vol. 2, no. 3, pp. 28-39, May/June 2004.
    • (2004) IEEE Security and Privacy Magazine , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.1    Perrig, A.2
  • 16
    • 36849079903 scopus 로고    scopus 로고
    • A survey of routing attacks in mobile ad hoc networks
    • DOI 10.1109/MWC.2007.4396947
    • B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, "A Survey of Routing Attacks in Mobile Ad Hoc Networks," IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 85-91, Oct. 2007. (Pubitemid 350231658)
    • (2007) IEEE Wireless Communications , vol.14 , Issue.5 , pp. 85-91
    • Kannhavong, B.1    Nakayama, H.2    Nemoto, Y.3    Kato, N.4    Jamalipour, A.5
  • 17
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • DOI 10.1016/S1570-8705(03)00008-8
    • C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Ad Hoc Networks, vol. 1, nos. 2/3, pp. 293-315, 2003. (Pubitemid 40421415)
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 21
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • DOI 10.1007/s11276-004-4744-y
    • Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Wireless Networks, vol. 11, no. 1, pp. 21-38, 2005. (Pubitemid 40536374)
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 23
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • DOI 10.1016/S1570-8705(03)00019-2
    • Y. Hu, D. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Ad Hoc Networks, vol. 1, no. 1, pp. 175-192, 2003. (Pubitemid 40421401)
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 28
    • 78751671554 scopus 로고    scopus 로고
    • Cross-layer detection of sinking behavior in wireless ad hoc networks using SVM and FDA
    • Mar./Apr
    • J. Felix, C. Joseph, B.-S. Lee, A. Das, and B. Seet, "Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA," IEEE Trans. Dependable and Secure Computing, vol. 8, no. 2, pp. 233-245, Mar./Apr. 2011.
    • (2011) IEEE Trans. Dependable and Secure Computing , vol.8 , Issue.2 , pp. 233-245
    • Felix, J.1    Joseph, C.2    Lee, B.-S.3    Das, A.4    Seet, B.5
  • 30
    • 34247485223 scopus 로고    scopus 로고
    • Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method
    • S. Kurosawa, H. Nakayama, N. Kato, and A. Jamalipour, "Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method," Int'l J. Network Security, vol. 105, no. 627, pp. 65-68, 2006.
    • (2006) Int'l J. Network Security , vol.105 , Issue.627 , pp. 65-68
    • Kurosawa, S.1    Nakayama, H.2    Kato, N.3    Jamalipour, A.4
  • 31
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," Proc. IEEE INFOCOM, vol. 3, pp. 1976-1986, 2004.
    • (2004) Proc. IEEE INFOCOM , vol.3 , pp. 1976-1986
    • Hu, Y.1    Perrig, A.2    Johnson, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.