메뉴 건너뛰기




Volumn 18, Issue 6, 2013, Pages 908-922

Enhancing efficiency of node compromise attacks in vehicular ad-hoc networks using connected dominating set

Author keywords

Attack efficiency; Attack modeling; Connected dominating set; Node compromise attack; VANET

Indexed keywords

ATTACK MODEL; COMMUNICATION RANGE; CONNECTED DOMINATING SET; CRYPTOGRAPHIC KEY; DYNAMICAL NETWORKS; NETWORK BACKBONES; NODE COMPROMISE; VANET;

EID: 84893861403     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11036-013-0469-4     Document Type: Article
Times cited : (23)

References (44)
  • 4
    • 3042778324 scopus 로고    scopus 로고
    • Stochastic properties of the random waypoint mobility model
    • Bettstetter C, Hartenstein H, Pérez-Costa X (2004) Stochastic properties of the random waypoint mobility model. Wirel Netw 10(5):555-567
    • (2004) Wirel Netw , vol.10 , Issue.5 , pp. 555-567
    • Bettstetter, C.1    Hartenstein, H.2    Pérez-Costa, X.3
  • 8
    • 84893841880 scopus 로고    scopus 로고
    • Node compromise attacks and network connectivity
    • International Society for Optics and Photonics
    • Chan K, Fekri F (2007) Node compromise attacks and network connectivity. In: Defense and security symposium, pp 65,780W-65,780W. International Society for Optics and Photonics
    • (2007) Defense and Security Symposium
    • Chan, K.1    Fekri, F.2
  • 9
    • 84887997518 scopus 로고    scopus 로고
    • Enhancing the attacking efficiency of the node capture attack in wsn: A matrix approach
    • Chi LinGW(2013) Enhancing the attacking efficiency of the node capture attack in wsn: a matrix approach. J Supercomput
    • (2013) J Supercomput
    • Chi Lin, G.W.1
  • 10
    • 17244373061 scopus 로고    scopus 로고
    • An extended localized algorithm for connected dominating set formation in ad hoc wireless networks
    • Dai F,Wu J (2004) An extended localized algorithm for connected dominating set formation in ad hoc wireless networks. IEEE Trans Parallel Distrib Syst 15(10):908-920
    • (2004) IEEE Trans Parallel Distrib Syst , vol.15 , Issue.10 , pp. 908-920
    • Dai, F.1    Wu, J.2
  • 12
    • 67651048997 scopus 로고    scopus 로고
    • Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory
    • De P, Liu Y, Das SK (2009) Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. ACM Trans Sens Netw (TOSN) 5(3):23-50
    • (2009) ACM Trans Sens Netw (TOSN) , vol.5 , Issue.3 , pp. 23-50
    • De, P.1    Liu, Y.2    Das, S.K.3
  • 13
    • 79953816985 scopus 로고    scopus 로고
    • Increasing resiliency in multiphase wireless sensor networks: Generationwise key predistribution approach
    • Ergun M, Levi A, Savas E (2011) Increasing resiliency in multiphase wireless sensor networks: generationwise key predistribution approach. Comput J 54(4):602-616
    • (2011) Comput J , vol.54 , Issue.4 , pp. 602-616
    • Ergun, M.1    Levi, A.2    Savas, E.3
  • 15
    • 84875706246 scopus 로고    scopus 로고
    • Group communication on highways: An evaluation study of geocast protocols and applications
    • Felice MD, Bedogni L, Bononi L (2012) Group communication on highways: an evaluation study of geocast protocols and applications. Ad Hoc Netw 11(7):818-832
    • (2012) Ad Hoc Netw , vol.11 , Issue.7 , pp. 818-832
    • Felice, M.D.1    Bedogni, L.2    Bononi, L.3
  • 21
    • 79958096565 scopus 로고    scopus 로고
    • Performance evaluation of routing protocols in vehicular ad hoc networks
    • Husain A, Kumar B, Doegar A (2011) Performance evaluation of routing protocols in vehicular ad hoc networks. Int J Internet Protocol Technol 6(1):38-45
    • (2011) Int J Internet Protocol Technol , vol.6 , Issue.1 , pp. 38-45
    • Husain, A.1    Kumar, B.2    Doegar, A.3
  • 22
    • 77956926901 scopus 로고    scopus 로고
    • Security attacks and solutions for vehicular ad hoc networks
    • Isaac JT, Zeadally S, Cámara JS (2010) Security attacks and solutions for vehicular ad hoc networks. IET Commun 4(7):894-903
    • (2010) IET Commun , vol.4 , Issue.7 , pp. 894-903
    • Isaac, J.T.1    Zeadally, S.2    Cámara, J.S.3
  • 29
    • 50249147682 scopus 로고    scopus 로고
    • Illusion attack on vanet applications-A message plausibility problem
    • Lo NW, Tsai HC (2007) Illusion attack on vanet applications-a message plausibility problem. In: 2007 IEEE Globecom Workshops. IEEE, pp 1-8
    • (2007) 2007 IEEE Globecom Workshops. IEEE , pp. 1-8
    • Lo, N.W.1    Tsai, H.C.2
  • 30
  • 34
    • 62249166562 scopus 로고    scopus 로고
    • Dtn based dominating set routing for manet in heterogeneous wireless networking
    • Samuel H, Zhuang W, Preiss B (2009) Dtn based dominating set routing for manet in heterogeneous wireless networking. Mob Netw Appl 14(2):154-164
    • (2009) Mob Netw Appl , vol.14 , Issue.2 , pp. 154-164
    • Samuel, H.1    Zhuang, W.2    Preiss, B.3
  • 35
    • 34248339107 scopus 로고    scopus 로고
    • Modeling adaptive node capture attacks in multi-hop wireless networks
    • Tague P, Poovendran R (2007) Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Netw 5(6):801-814
    • (2007) Ad Hoc Netw , vol.5 , Issue.6 , pp. 801-814
    • Tague, P.1    Poovendran, R.2
  • 38
    • 67649198136 scopus 로고    scopus 로고
    • Evaluating the vulnerability of network traffic using joint security and routing analysis
    • Tague P, Slater D, Rogers J, Poovendran R (2009) Evaluating the vulnerability of network traffic using joint security and routing analysis. IEEE Trans Depend Secure Comput 6(2):111-123
    • (2009) IEEE Trans Depend Secure Comput , vol.6 , Issue.2 , pp. 111-123
    • Tague, P.1    Slater, D.2    Rogers, J.3    Poovendran, R.4
  • 41
    • 84893821137 scopus 로고    scopus 로고
    • A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set
    • Wu G, Chen X, Obaidat MS, Lin C (2012) A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set. Secur Commun Netw
    • (2012) Secur Commun Netw
    • Wu, G.1    Chen, X.2    Obaidat, M.S.3    Lin, C.4
  • 42
    • 46749099829 scopus 로고    scopus 로고
    • Providing vanet security through active position detection
    • Yan G, Olariu S, Weigle MC (2008) Providing vanet security through active position detection. Comput Commun 31(12):2883-2897
    • (2008) Comput Commun , vol.31 , Issue.12 , pp. 2883-2897
    • Yan, G.1    Olariu, S.2    Weigle, M.C.3
  • 43
    • 57049127600 scopus 로고    scopus 로고
    • Efficient directional network backbone construction in mobile ad hoc networks
    • Yang S, Wu J, Dai F (2008) Efficient directional network backbone construction in mobile ad hoc networks. IEEE Trans Parallel Distrib Syst 19(12):1601-1613
    • (2008) IEEE Trans Parallel Distrib Syst , vol.19 , Issue.12 , pp. 1601-1613
    • Yang, S.1    Wu, J.2    Dai, F.3
  • 44
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L, Haas ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24-30
    • (1999) IEEE Netw , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.