메뉴 건너뛰기




Volumn 9, Issue 2, 2014, Pages 63-77

A black hole attack model using topology approximation for reactive ad-hoc routing protocols

Author keywords

Ad hoc network protocols; Black hole attack; Network availability modelling; Network topology approximation; Networks; Performance analysis; Reactive ad hoc routing; Security

Indexed keywords

AD HOC NETWORKS; ANALYTICAL MODELS; AVAILABILITY; COMPUTER CRIME; GRAVITATION; INTERNET PROTOCOLS; NETWORK ROUTING; NETWORK SECURITY; NETWORKS (CIRCUITS); PACKET LOSS; ROUTING PROTOCOLS; STARS;

EID: 84899859912     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2014.060755     Document Type: Article
Times cited : (4)

References (31)
  • 1
    • 50149105732 scopus 로고    scopus 로고
    • Impact of denial of service attacks on ad hoc networks
    • Aad, I., Hubaux, J-P. and Knightly, E.W. (2008) 'Impact of denial of service attacks on ad hoc networks', IEEE/ACM Transactions on Networking, Vol. 16, No. 4, pp.791-802.
    • (2008) IEEE/ACM Transactions on Networking , vol.16 , Issue.4 , pp. 791-802
    • Aad, I.1    Hubaux, J.-P.2    Knightly, E.W.3
  • 6
    • 36849010124 scopus 로고    scopus 로고
    • A survey on attacks and countermeasures in mobile ad hoc networks
    • in Xiao, Y., Shen, X. and Du, D-Z. (Eds. Springer, New York, NY
    • Bing, W., Jianmin, C., Jie, W. and Cardei, M. (2007) 'A survey on attacks and countermeasures in mobile ad hoc networks', in Xiao, Y., Shen, X. and Du, D-Z. (Eds.): Wireless Network Security, Springer, New York, NY, pp.103-136.
    • (2007) Wireless Network Security , pp. 103-136
    • Bing, W.1    Jianmin, C.2    Jie, W.3    Cardei, M.4
  • 11
    • 34547679832 scopus 로고    scopus 로고
    • Performance analysis of ad-hoc networks under black hole attacks
    • DOI 10.1109/SECON.2007.342872, 4147402, 2007 IEEE SoutheastCon
    • Dokurer, S., Erten, Y.M. and Acar, C.E. (2007) 'Performance analysis of ad-hoc networks under black hole attacks', Southeast Con., IEEE, pp.148-153. (Pubitemid 47208272)
    • (2007) Conference Proceedings - IEEE SOUTHEASTCON , pp. 148-153
    • Dokurer, S.1    Erten, Y.M.2    Acar, C.E.3
  • 14
    • 1542317831 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • Hu, Y., Perrig, A. and Johnson, D. (2003) 'Rushing attacks and defense in wireless ad hoc network routing protocols', ACM Workshop on Wireless Security, pp.30-40.
    • (2003) ACM Workshop on Wireless Security , pp. 30-40
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 17
    • 0003574189 scopus 로고
    • Advanced computer architecture: Parallelism
    • McGraw-Hill, New York
    • Hwang, K. (1993) 'Advanced computer architecture: Parallelism', Scalability, Programmability, McGraw-Hill, New York, pp.75-96.
    • (1993) Scalability, Programmability , pp. 75-96
    • Hwang, K.1
  • 19
    • 50049105221 scopus 로고    scopus 로고
    • Routing protocol performance over intermittent links
    • Last accessed: February 7 2012
    • Kiwior, D. and Lam, L. (2007) 'Routing protocol performance over intermittent links', MITRE, Last accessed: February 7, 2012.
    • (2007) MITRE
    • Kiwior, D.1    Lam, L.2
  • 20
  • 21
    • 84856941187 scopus 로고    scopus 로고
    • Routing security in ad hoc networks
    • Lundberg, J. (2000) 'Routing security in ad hoc networks', Seminar on Network Security, pp.1-12.
    • (2000) Seminar on Network Security , pp. 1-12
    • Lundberg, J.1
  • 24
    • 84899795868 scopus 로고    scopus 로고
    • Rice Monarch Project, Last accessed September 13 2011
    • Rice Monarch Project (2000) Implementation of DSR, http://www.monarch.cs. rice.edu/dsr-impl.html, Last accessed September 13, 2011.
    • (2000) Implementation of DSR
  • 27
    • 84899792641 scopus 로고    scopus 로고
    • Last accessed September 13 2011
    • Song, A. (2009) picoNet, http://sourceforge.net/projects/piconet/. Last accessed September 13, 2011.
    • (2009) PicoNet
    • Song, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.