메뉴 건너뛰기




Volumn , Issue , 2003, Pages 60-67

How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols

Author keywords

Ad hoc networks; Computer aided software engineering; Computer science; Hardware; Mobile ad hoc networks; Mobile computing; National security; Protection; Routing protocols; Sun

Indexed keywords

AD HOC NETWORKS; ATOMS; COMPUTER AIDED SOFTWARE ENGINEERING; COMPUTER HARDWARE; COMPUTER SCIENCE; CYBERNETICS; MOBILE COMPUTING; NATIONAL SECURITY; NETWORK PROTOCOLS; NETWORK SECURITY; ROUTERS; ROUTING PROTOCOLS; SOFTWARE ENGINEERING; SUN; TELECOMMUNICATION NETWORKS;

EID: 84903836776     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SMCSIA.2003.1232402     Document Type: Conference Paper
Times cited : (96)

References (15)
  • 4
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks)
    • June
    • S. Buchegger and J. L. Boudec, "Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks)," in Proc. of ACM MobiHoc 2002, pp. 226-236, June 2002.
    • (2002) Proc. of ACM MobiHoc 2002 , pp. 226-236
    • Buchegger, S.1    Boudec, J.L.2
  • 5
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. MobiCom 2000, pp. 255-265, 2000.
    • (2000) Proc. MobiCom 2000 , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 6
    • 84946428465 scopus 로고    scopus 로고
    • C. Perkins, E. Belding-Royer, and S. Das. Internet Draft, June 2002. draft-ietf-manet-aodv-11.txt
    • C. Perkins, E. Belding-Royer, and S. Das. Internet Draft, June 2002. draft-ietf-manet-aodv-11.txt.
  • 9
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 15
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Y. Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks," in Proc. of ACM MobiCom 2000), pp. 275-283, 2000.
    • (2000) Proc. of ACM MobiCom 2000 , pp. 275-283
    • Zhang, Y.1    Lee, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.