|
Volumn , Issue , 2003, Pages 60-67
|
How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
|
Author keywords
Ad hoc networks; Computer aided software engineering; Computer science; Hardware; Mobile ad hoc networks; Mobile computing; National security; Protection; Routing protocols; Sun
|
Indexed keywords
AD HOC NETWORKS;
ATOMS;
COMPUTER AIDED SOFTWARE ENGINEERING;
COMPUTER HARDWARE;
COMPUTER SCIENCE;
CYBERNETICS;
MOBILE COMPUTING;
NATIONAL SECURITY;
NETWORK PROTOCOLS;
NETWORK SECURITY;
ROUTERS;
ROUTING PROTOCOLS;
SOFTWARE ENGINEERING;
SUN;
TELECOMMUNICATION NETWORKS;
AD HOC ON DEMAND DISTANCE VECTOR;
INSIDER ATTACK;
MOBILE AD-HOC ROUTING;
NODE ISOLATION;
PROTECTION;
RESOURCE CONSUMPTION;
ROUTING MESSAGE;
SYSTEMATIC ANALYSIS;
MOBILE AD HOC NETWORKS;
|
EID: 84903836776
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/SMCSIA.2003.1232402 Document Type: Conference Paper |
Times cited : (96)
|
References (15)
|