메뉴 건너뛰기




Volumn 4357 LNCS, Issue , 2006, Pages 83-97

So near and yet so far: Distance-bounding attacks in wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK STRATEGIES; CONSTRAINED DEVICES; DISTANCE BOUNDING; DISTANCE-BOUNDING PROTOCOLS; EARLY DECISION; GUESSED VALUE; GUESSING ATTACKS; WAVE FORMS;

EID: 84876367662     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11964254_9     Document Type: Conference Paper
Times cited : (123)

References (23)
  • 1
    • 84976295016 scopus 로고
    • Distance-bounding protocols (extended abstract
    • Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: EUROCRYPT. (1993) 344-359
    • (1993) Eurocrypt , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 4
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless networks. In: INFOCOM. (2003)
    • (2003) Infocom
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 6
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • DOI 10.1016/S1570-8705(03)00008-8
    • Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2-3) (2003) 293-315 (Pubitemid 40421415)
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 7
    • 4544259841 scopus 로고    scopus 로고
    • SECTOR: Secure tracking of node encounters in multi-hop wireless networks
    • Setia, S., Swarup, V., eds.
    • Čapkun, S., Buttyán, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In Setia, S., Swarup, V., eds.: SASN, ACM (2003) 21-32
    • (2003) SASN, ACM , pp. 21-32
    • Čapkun, S.1    Buttyán, L.2    Hubaux, J.P.3
  • 8
    • 0032165502 scopus 로고    scopus 로고
    • Designing a positioning system for finding things and people indoors
    • Werb, J., Lanzl, C.: Designing a positioning system for finding things and people indoors. IEEE Spectrum 35(9) (1998) 71-78
    • (1998) IEEE Spectrum , vol.35 , Issue.9 , pp. 71-78
    • Werb, J.1    Lanzl, C.2
  • 9
    • 0033872896 scopus 로고    scopus 로고
    • RADAR: An in-building RF-based user location and tracking system
    • Bahl, P., Padmanabhan, V.: RADAR: An in-building RF-based user location and tracking system. In: Nineteenth Annual Joint Conference of the IEEE Computer and Communication Society, IEEE (2000) 775-784 (Pubitemid 30584527)
    • (2000) Proceedings - IEEE INFOCOM , vol.2 , pp. 775-784
    • Bahl Paramvir1    Padmanabhan Venkata, N.2
  • 11
    • 27944459744 scopus 로고    scopus 로고
    • Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    • Liu, D., Ning, P., Du, W.: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: ICDCS, IEEE Computer Society (2005) 609-619
    • (2005) ICDCS, IEEE Computer Society , pp. 609-619
    • Liu, D.1    Ning, P.2    Du, W.3
  • 12
    • 25844439422 scopus 로고    scopus 로고
    • Secure positioning of wireless devices with application to sensor networks
    • Čapkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: INFOCOM. (2005)
    • (2005) Infocom
    • Čapkun, S.1    Hubaux, J.P.2
  • 13
    • 33144454801 scopus 로고    scopus 로고
    • Secure positioning in wireless networks
    • DOI 10.1109/JSAC.2005.861380
    • Čapkun, S., Hubaux, J.P.: Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications: Special Issue on Security in Wireless Ad Hoc Networks 24(2) (2006) 221-232 (Pubitemid 43269745)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 221-232
    • Capkun, S.1
  • 17
    • 33847329743 scopus 로고    scopus 로고
    • An RFID distance bounding protocol
    • Athens, Greece, 5-9 September 2005, IEEE Computer Society
    • Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: IEEE SecureComm 2005, Athens, Greece, 5-9 September 2005, IEEE Computer Society (2005) 67-73
    • (2005) IEEE SecureComm 2005 , pp. 67-73
    • Hancke, G.P.1    Kuhn, M.G.2
  • 22
    • 1542287663 scopus 로고    scopus 로고
    • Proceedings of the 2003 ACM workshop on wireless security
    • San Diego, CA, USA, September 19, 2003 In Maughan, W.D., Perrig, A., eds., ACM
    • Maughan, W.D., Perrig, A., eds.: Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003. In Maughan, W.D., Perrig, A., eds.: Workshop on Wireless Security, ACM (2003)
    • (2003) Workshop on Wireless Security
    • Maughan, W.D.1    Perrig, A.2
  • 23
    • 84876361213 scopus 로고    scopus 로고
    • Crossbow Technology: MICA2 mote (2006) http://www.xbow.com/Products/ Product.pdf files/Wireless pdf/MICA2 Datasheet.pdf.
    • (2006) Crossbow Technology: MICA2 Mote


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.