메뉴 건너뛰기




Volumn , Issue , 2014, Pages 752-755

Survey of RTS-CTS attacks in wireless network

Author keywords

Denial of Service; Low Rate attacks; NAV; RTS CTS attacks

Indexed keywords

COMMUNICATION SYSTEMS; DENIAL-OF-SERVICE ATTACK; LOCAL AREA NETWORKS; WIRELESS NETWORKS;

EID: 84902596914     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSNT.2014.158     Document Type: Conference Paper
Times cited : (9)

References (15)
  • 2
    • 84925368904 scopus 로고    scopus 로고
    • 802. 11 Denial-of-Service attacks: Real vulnerabilities and practical solutions
    • Washington D. C., USA, Aug.
    • J. Bellardo and S. Savage, "802. 11 Denial-of-Service attacks: Real vulnerabilities and practical solutions," 12th USENIX Security Symposium, Washington D. C., USA, vol. 12, pp. 2-2, Aug. 2003.
    • (2003) 12th USENIX Security Symposium , vol.12 , pp. 2-2
    • Bellardo, J.1    Savage, S.2
  • 3
    • 79955055383 scopus 로고    scopus 로고
    • Protecting wireless networks against a Denial of Service attack based on Virtual jamming
    • CA, USA, Sept., unpublished
    • Dazhi Chen, Jing Deng and K. Varshney Pramod, "Protecting wireless networks against a Denial of Service attack based on Virtual jamming," MobiCom 2003, CA, USA, Sept. 2003, unpublished.
    • (2003) MobiCom 2003
    • Chen, D.1    Deng, J.2    Varshney Pramod, K.3
  • 5
    • 78149444755 scopus 로고    scopus 로고
    • Greedy receivers in IEEE 802. 11 Hotspots: Impacts and detection
    • Mi Kyung Han and Lili Qiu, "Greedy receivers in IEEE 802. 11 Hotspots: impacts and Detection," Dependable and Secure Computing,vol. 7, pp. 410-423, 2010.
    • (2010) Dependable and Secure Computing , vol.7 , pp. 410-423
    • Kyung Han, M.1    Qiu, L.2
  • 9
    • 84865731679 scopus 로고    scopus 로고
    • Flow level detection and filtering of low-rate DDoS
    • Changwang Zhang, Zhiping Cai, Weifeng Chen, Xiapu Luo and Jianping Yin "Flow level detection and filtering of low-rate DDoS", Computer Networks 56 (2012) 3417-3431.
    • (2012) Computer Networks , vol.56 , pp. 3417-3431
    • Zhang, C.1    Cai, Z.2    Chen, W.3    Luo, X.4    Yin, J.5
  • 10
    • 78649431870 scopus 로고    scopus 로고
    • A Cross-Layer scheme for solving hidden device problem in IEEE 802. 15. 4 wireless sensor networks
    • February
    • Hsueh-Wen Tseng, Shan-Chi Yang, Ping-Cheng Yeh, and Ai-Chun Pang "A Cross-Layer Scheme for Solving Hidden Device Problem in IEEE 802. 15. 4 Wireless Sensor Networks", IEEE Sensors Journal, Vol. 11, No. 2, February 2011.
    • (2011) IEEE Sensors Journal , vol.11 , Issue.2
    • Tseng, H.1    Yang, S.2    Yeh, P.3    Pang, A.4
  • 11
    • 84880142357 scopus 로고    scopus 로고
    • A unified analysis of IEEE 802. 11 DCF networks: Stability, throughput, and delay
    • August
    • Lin Dai and Xinghua Sun "A Unified Analysis Of IEEE 802. 11 DCF Networks: Stability, Throughput, And Delay", IEEE Transactions On Mobile Computing, Vol. 12, No. 8, August 2013.
    • (2013) IEEE Transactions on Mobile Computing , vol.12 , Issue.8
    • Dai, L.1    Sun, X.2
  • 12
    • 84880542851 scopus 로고    scopus 로고
    • Hidden-Node detection in IEEE 802. 11n wireless LANs
    • July
    • Minho Kim and Chong-Ho Choi "Hidden-Node Detection in IEEE 802. 11n Wireless LANs" IEEE Transactions On Vehicular Technology, Vol. 62, No. 6, July 2013.
    • (2013) IEEE Transactions on Vehicular Technology , vol.62 , Issue.6
    • Kim, M.1    Choi, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.