메뉴 건너뛰기




Volumn 25, Issue 7, 2012, Pages 903-925

A new security model to prevent denial-of-service attacks and violation of availability in wireless networks

Author keywords

authentication protecting; DoS attacks; integrity preserving; modified hash functions; network availability; replay preventing

Indexed keywords

CLEAR TEXT; CONTROL FRAMES; CRITICAL AREA; DENIAL OF SERVICE ATTACKS; DOS ATTACKS; INTEGRITY PRESERVING; NETWORK AVAILABILITY; REPLAY PREVENTING; SECURITY FLAWS; SECURITY MODEL;

EID: 84863111146     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.1296     Document Type: Article
Times cited : (19)

References (20)
  • 3
    • 73349103437 scopus 로고    scopus 로고
    • DDoS attack detection using three-state partition based on flow interaction
    • Springer: New York
    • Cheng J, Zhang B, Yin J, Liu Y, Cai Z,. DDoS attack detection using three-state partition based on flow interaction. In Communications in Computer and Information Science, Vol. 58, Springer: New York, 2009; 176-184.
    • (2009) Communications in Computer and Information Science , vol.58 , pp. 176-184
    • Cheng, J.1    Zhang, B.2    Yin, J.3    Liu, Y.4    Cai, Z.5
  • 4
    • 65249160136 scopus 로고    scopus 로고
    • Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC
    • Rachedi A, Benslimane A,. Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC. Wireless Communications and Mobile Computing 2009; 9 (4): 469-488.
    • (2009) Wireless Communications and Mobile Computing , vol.9 , Issue.4 , pp. 469-488
    • Rachedi, A.1    Benslimane, A.2
  • 5
    • 67349109409 scopus 로고    scopus 로고
    • Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
    • Bicakci K, Tavli B,. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. ACM Journal of Computer Standards & Interfaces 2009; 31 (5): 931-941.
    • (2009) ACM Journal of Computer Standards & Interfaces , vol.31 , Issue.5 , pp. 931-941
    • Bicakci, K.1    Tavli, B.2
  • 7
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Washington, D.C., USA, 4-8 August
    • Bellardo J, Savage S,. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. Proceedings of 12th USENIX Security Symposium, Washington, D.C., USA, 4-8 August 2003; 15-28.
    • (2003) Proceedings of 12th USENIX Security Symposium , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 18
    • 71549132520 scopus 로고    scopus 로고
    • Distinguishing attack and second-preimage attack on the CBC-like MACs
    • Springer: New York
    • Jia K, Wang X, Yuan Z, Xu G,. Distinguishing attack and second-preimage attack on the CBC-like MACs. In Lecture Notes in Computer Science (LNCS), Vol. 5888. Springer: New York, 2009; 349-361.
    • (2009) Lecture Notes in Computer Science (LNCS) , vol.5888 , pp. 349-361
    • Jia, K.1    Wang, X.2    Yuan, Z.3    Xu, G.4
  • 19
    • 51849140875 scopus 로고    scopus 로고
    • Key-recovery attacks on universal hash function based MAC algorithms
    • Springer: New York
    • Handschuh H, Preneel B,. Key-recovery attacks on universal hash function based MAC algorithms. In Lecture Notes in Computer Science (LNCS), Vol. 5157. Springer: New York, 2008; 144-161.
    • (2008) Lecture Notes in Computer Science (LNCS) , vol.5157 , pp. 144-161
    • Handschuh, H.1    Preneel, B.2
  • 20
    • 77951753468 scopus 로고    scopus 로고
    • NIST Special Publication SP 800-107, National Institute of Standards and Technology, Gaithersburg, MD, USA
    • Dang Q,. Recommendation for Applications Using Approved Hash Algorithms. NIST Special Publication SP 800-107, National Institute of Standards and Technology, Gaithersburg, MD, USA, 2009.
    • (2009) Recommendation for Applications Using Approved Hash Algorithms
    • Dang, Q.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.