Slander-Resistant Forwarding Isolation in Ad Hoc Networks
This paper focuses on how to isolate attackers that inject packets to cause Denial-of-Service (DoS) in ad hoc networks. Our security analysis shows that current hop-by-hop source authentication protocols only partially achieve the defence goals, although they allow legitimate nodes to effectively id...
Saved in:
Main Authors: | GU, Qijun, CHU, Chao-Hsien, LIU, Peng, ZHU, Sencun |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2006
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1192 http://dx.doi.org/10.1504/IJMNDI.2006.012086 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Defense Against Packet Injection in Ad Hoc Networks
by: GU, Qijun, et al.
Published: (2007) -
Brief announcement: DoS-resilient secure aggregation queries in sensor networks
by: Yu, H.
Published: (2013) -
Traffic Monitoring and analysis for source identification
by: LU LIMING
Published: (2011) -
Effect of malicious synchronization
by: Chan, M.C., et al.
Published: (2013) -
SQR: In-network Packet Loss Recovery from Link Failures for Highly Reliable Datacenter Networks
by: JOSHI RAJ, et al.
Published: (2020)