Analysis of the Bogus Routing Information Attacks in Sensor Networks |
Lee, Myung-Jin
(이화여자대학교 컴퓨터학과)
Kim, Mi-Hui (이화여자대학교 컴퓨터학과) Chae, Ki-Joon (이화여자대학교 컴퓨터학과) Kim, Ho-Won (한국전자통신연구원 정보보호연구단) |
1 | Ning, P., Sun, K., 'How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocol,' Proc. of Information Assurance Workshop, IEEE Systems, Man and Cybernetics Society, 2003 DOI |
2 | Karp, B., Kung, H., 'GPSR: Greedy Perimeter stateless Routing for Wireless Networks,' MobiCom, 2000 DOI |
3 | Douceur, J., 'The Sybil Attack,' 1st International Workshop on Peer-to-Peer Systems 2002 DOI |
4 | Newsome, J., Shi, E., Song, D., Perrig, A., 'The sybil attack in sensor networks: analysis & defenses,' Proc. of the third international symposium on Information processing in sensor networks, ACM, pp.259-268, 2004 DOI |
5 | Wood, A.D., Stankovic, J.A., Stankovic, 'Denial of service in sensor network,' Computer IEEE, Volume 35, pp.54-62, Oct., 2002 DOI ScienceOn |
6 | Perkins, C., Delding-Royer, E., Das, S., 'Ad hoc On-Demand Distance Vector (AODV) Routing,' IETF RFC 3561, 2003 |
7 | Karlof, C., Wagner, D., 'Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,' First IEEE International Workshop on Sensor Network Protocols and Applications, May, 2003 DOI |
8 | Li, M., 'Secure Routing Protocols in Wireless Sensor Networks,' CSCE 990, UNL, Nov., 2004 |
9 | 김신효, 강유성, 정병호, 정교일, 'u-센서 네트워크 보안 기술 동향', 전자통신동향분석, 제20권 제1호, Feb., 2005 과학기술학회마을 |
10 | Benjamin, J., Culpepper, H., Tseng, C., 'Sinkhole intrusion indicators in DSR MANETs,' Proc. First International Conference on Broad band Networks, pp.681-688, 2004 DOI |
11 | Blackert, W.J., Gregg, D.M., Castner, A.K., Kyle, E.M., Hom, R.L., Jokerst, R.M., 'Analyzing interaction between distributed denial of service attacks and mitigation technologies,' Proc. of DARPA Information Survivability Conference and Exposition, Volume 1, pp.26-36, Apr., 2003 |
12 | Wang, B.T., Schulzrinne, H., 'An IP traceback mechanism for reflective DoS attacks,' Canadian Conference on Electrical and Computer Engineering, Volume 2, pp.901-904, May, 2004 |
13 | Wood, A.D., Stankovic, J.A., 'Denial of service in sensor network,' Computer IEEE, Volume 35, pp.54-62, Oct., 2002 DOI ScienceOn |
14 | The Network Simulator-ns-2, http://www.isi.edu/nsnam/ns |
15 | IEEE 802.15.4-2003 IEEE Standard for Information Technology-Part 15.4: Wireless Medium Access Control (MAC) and Physical layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANS), 2003 |
16 | Misic, V.B., Jun Fang, Misic, J., 'MAC layer security of 802.15.4-compliant networks,' Proc. of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005 DOI |
17 | Liao, W.H., Tseng, Y.C., Sheu, J.P., 'GRID: A Fully Location-Aware Routing Protocol for Mobile Ad Hoc Networks,' Telecommunication Systems, 18(1):pp.37-60, 2001 DOI |
18 | Wireless and Mobility Extensions to ns-2, http://www.monarch.cs.cmu.edu/cmu-ns.html |