메뉴 건너뛰기




Volumn , Issue , 2014, Pages 559-564

MANET security: A survey

Author keywords

ad hoc; attack; mobile; network; security; threat

Indexed keywords

MOBILE SECURITY; NETWORKS (CIRCUITS); TELECOMMUNICATION NETWORKS;

EID: 84946690208     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCSCE.2014.7072781     Document Type: Conference Paper
Times cited : (31)

References (43)
  • 1
    • 62249186737 scopus 로고    scopus 로고
    • On address privacy in mobile ad hoc networks
    • February
    • Yanchao Zhang and Kui Ren, "On Address Privacy in Mobile Ad Hoc Networks, " Mobile Network Applications, vol. 14, no. 2, pp. 188-197, February 2009.
    • (2009) Mobile Network Applications , vol.14 , Issue.2 , pp. 188-197
    • Zhang, Y.1    Ren, K.2
  • 4
    • 85024283108 scopus 로고    scopus 로고
    • IETF IETF, California, Standard
    • IETF, "RFC 2828, " IETF, California, Standard 2000.
    • (2000) RFC 2828
  • 6
    • 36849010124 scopus 로고    scopus 로고
    • A survey on attacks and countermeasures in mobile ad hoc networks
    • Yang Xiao, XueminSherman Shen, and Ding-Zhu Du, Eds. USA Springer US ch. 12
    • Jianmin Chen, Jie Wu, Mihaela Cardei Bing Wu, " A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks," in Wireless Network Security, Yang Xiao, XueminSherman Shen, and Ding-Zhu Du, Eds. USA: Springer US, 2007, ch. 12, pp. 103-135.
    • (2007) Wireless Network Security , pp. 103-135
    • Chen, J.1    Wu, J.2    Cardei, M.3    Wu, B.4
  • 7
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • June
    • Hu Yih-Chun and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing , " IEEE Security & Privacy, vol. 2, no. 3, pp. 28-30, June 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.3 , pp. 28-30
    • Yih-Chun, H.1    Perrig, A.2
  • 8
    • 84927728096 scopus 로고    scopus 로고
    • Evaluation of secure routing protocols in mobile ad hoc networks (manets)
    • Levent Ertaul and Dilraba Ibrahim, "Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs), " in Security and Management., 2009, pp. 363-369.
    • (2009) Security and Management , pp. 363-369
    • Ertaul, L.1    Ibrahim, D.2
  • 12
    • 84926631617 scopus 로고    scopus 로고
    • A novel secure routing protocol for manets
    • Xin Wang, Ed. USA: InTech ch. 22
    • Zhongwei Zhang, "A Novel Secure Routing Protocol for MANETs, " in Mobile Ad-Hoc Networks: Protocol Design, Xin Wang, Ed. USA: InTech, 2011, ch. 22, pp. 455-465.
    • Mobile Ad-Hoc Networks: Protocol Design , vol.2011 , pp. 455-465
    • Zhang, Z.1
  • 13
    • 2442582716 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector routing
    • July
    • Manel Guerrero Zapata, "Secure Ad hoc On-Demand Distance Vector Routing, " Mobile Computing and Communications Review, vol. 6, no. 3, pp. 106-107, July 2002.
    • (2002) Mobile Computing and Communications Review , vol.6 , Issue.3 , pp. 106-107
    • Zapata, M.G.1
  • 14
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in wireless ad hoc networks
    • October
    • Hongmei Deng, Wei Li, and Dharma P. Agrawal, " Routing security in wireless ad hoc networks ," IEEE Communications Magazine, vol. 40, no. 10, pp. 70-75, October 2002.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 70-75
    • Deng, H.1    Li, W.2    Agrawal, D.P.3
  • 20
    • 70749136973 scopus 로고    scopus 로고
    • Understanding dynamic denial of service attacks in mobile ad hoc networks
    • Washington DC
    • Fei Xing and Wenye Wang, "Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks, " in Military Communications Conference, Washington DC, 2006, pp. 1-7.
    • (2006) Military Communications Conference , pp. 1-7
    • Xing, F.1    Wang, W.2
  • 24
    • 24144437206 scopus 로고    scopus 로고
    • How to misuse aodv: A case study of insider attacks against mobile ad-hoc routing protocols
    • P. Ning and K. Sun, " How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols," Ad Hoc Networks, vol. 3, pp. 795-819, 2005.
    • (2005) Ad Hoc Networks , vol.3 , pp. 795-819
    • Ning, P.1    Sun, K.2
  • 25
    • 39149127588 scopus 로고    scopus 로고
    • Cryptographic versus trust-based methods for manet routing security
    • J. Cordasco and S. Wetzel, "Cryptographic Versus Trust-based Methods for MANET Routing Security, " Electronic Notes in Theoritical Computer Science, vol. 197, pp. 131-140, 2008.
    • (2008) Electronic Notes in Theoritical Computer Science , vol.197 , pp. 131-140
    • Cordasco, J.1    Wetzel, S.2
  • 26
    • 84886593344 scopus 로고    scopus 로고
    • Trust-based routing mechanism in manet: Design and implementation
    • October
    • T. Eissa, S. Abdul Razak, R.H. Khokhar, and N. Samian, " Trust-Based Routing Mechanism in MANET: Design and Implementation," Mobile Networks and Applications, vol. 18, no. 5, pp. 666-677, October 2013.
    • (2013) Mobile Networks and Applications , vol.18 , Issue.5 , pp. 666-677
    • Eissa, T.1    Abdul Razak, S.2    Khokhar, R.H.3    Samian, N.4
  • 27
    • 80053983111 scopus 로고    scopus 로고
    • Secrecy throughput of manets under passive and active attacks
    • October
    • Yingbin Liang, H. Vincent Poor, and Lei Ying, "Secrecy Throughput of MANETs Under Passive and Active Attacks, " IEEE TRANSACTIONS ON INFORMATION THEORY, vol. 57, no. 10, pp. 6692-7002, October 2011.
    • (2011) IEEE Transactions on Information Theory , vol.57 , Issue.10 , pp. 6692-7002
    • Liang, Y.1    Poor, H.V.2    Ying, L.3
  • 28
    • 84893746847 scopus 로고    scopus 로고
    • A probabilistic framework for jammer identification in manets
    • March
    • Massimiliano Albanesea, Alessandra De Benedictis, Sushil Jajodia, and Don Torrieric, " A probabilistic framework for jammer identification in MANETs, " Ad Hoc Networks, vol. 14, pp. 84-94, March 2014.
    • (2014) Ad Hoc Networks , vol.14 , pp. 84-94
    • Albanesea, M.1    De Benedictis, A.2    Jajodia, S.3    Torrieric, D.4
  • 31
    • 79955059662 scopus 로고    scopus 로고
    • Detection and preve ntion of denial of service (dos) attacks in mobile ad hoc networks using reputation-based incentive scheme
    • Mieso K. Denko, "Detection and Preve ntion of Denial of Service (DoS) Attacks in Mobile Ad Hoc Networks using Reputation-Based Incentive Scheme," Journal of Systemics, Cybernetics and Informatics, vol. 3, no. 4, pp. 1-9, 2005.
    • (2005) Journal of Systemics, Cybernetics and Informatics , vol.3 , Issue.4 , pp. 1-9
    • Denko, M.K.1
  • 37
    • 80053537536 scopus 로고    scopus 로고
    • Forced collision: Detecting wormhole attacks with physical layer network coding
    • October
    • Di Pu Zhiwei Li, Weichao Wang, and Alex Wyglinski, " Forced Collision: Detecting Wormhole Attacks with Physical Layer Network Coding," TSINGHUA SCIENCE AND TECHNOLOGY, vol. 16, no. 5, pp. 505-519, October 2011.
    • (2011) Tsinghua Science and Technology , vol.16 , Issue.5 , pp. 505-519
    • Zhiwei Li, D.P.1    Wang, W.2    Wyglinski, A.3
  • 38
    • 84927765785 scopus 로고    scopus 로고
    • A wormhole attack resistant neighbor discovery scheme with rdma protocol for 60 ghz directional network
    • December
    • Z. Shi et al., " A Wormhole Attack Resistant Neighbor Discovery Scheme With RDMA Protocol for 60 GHz Directional Network," IEEE Transactions on Emerging Topics in Computing, vol. 1, no. 2, pp. 341-352, December 2013.
    • (2013) IEEE Transactions on Emerging Topics in Computing , vol.1 , Issue.2 , pp. 341-352
    • Shi, Z.1
  • 40
    • 77957949158 scopus 로고    scopus 로고
    • On the vulnerabilities and protections of the olsr ad hoc routing protocol from the point of view of trust
    • September
    • R. T. De Souza Jr. , A. H. Adnane, C. Bidan, and L. Mé, " On the Vulnerabilities and Protections of the OLSR ad hoc Routing Protocol from the point of view of Trust," IEEE Latin America Transactions, vol. 7, no. 5, pp. 594-602, September 2009.
    • (2009) IEEE Latin America Transactions , vol.7 , Issue.5 , pp. 594-602
    • De Souza, R.T.1    Adnane, A.H.2    Bidan, C.3    Mé, L.4
  • 41
    • 84888646473 scopus 로고    scopus 로고
    • An intrusion detection & adaptive response mechanism for manets
    • February
    • A. Nadeem and M.P. Howrath, "An intrusion detection & adaptive response mechanism for MANETs, " Ad Hoc Networks, vol. 13, no. B, pp. 368-380, February 2014.
    • (2014) Ad Hoc Networks , vol.13 , Issue.B , pp. 368-380
    • Nadeem, A.1    Howrath, M.P.2
  • 43
    • 49649115473 scopus 로고    scopus 로고
    • Opening the pandora's box: Exploring the fundamental limitations of designing intrusion detection for manet routing attacks
    • J.F.C. Joseph, A. Das, B. Seet, and B. Lee, " Opening the Pandora's Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks, " Computer Communications, vol. 31, pp. 3178-3189, 2008.
    • (2008) Computer Communications , vol.31 , pp. 3178-3189
    • Joseph, J.F.C.1    Das, A.2    Seet, B.3    Lee, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.