메뉴 건너뛰기




Volumn 3313, Issue , 2005, Pages 152-165

Advanced detection of selfish or malicious nodes in ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; ITERATIVE METHODS; PROBLEM SOLVING; RELIABILITY; RESOURCE ALLOCATION; SECURITY OF DATA; SENSORS;

EID: 23944483569     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30496-8_13     Document Type: Conference Paper
Times cited : (51)

References (27)
  • 3
    • 0005943436 scopus 로고    scopus 로고
    • Modeling security threats
    • December
    • Bruce Schneier. Modeling security threats. Dr Dobb's Journal, December 1999. also available as http://www.ddj.com/documents/s=896/ddj9912a/9912a.htm.
    • (1999) Dr Dobb's Journal
    • Schneier, B.1
  • 4
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Atlanta, Georgia, USA, September
    • Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks. In Proceedings of MobiCom 2002, Atlanta, Georgia, USA, September 2002.
    • (2002) Proceedings of MobiCom 2002
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 6
    • 1542451215 scopus 로고    scopus 로고
    • Secure routing for mobile ad hoc networks
    • Working Session on Security in Wireless Ad Hoc Networks, EPFL, (published in), June
    • Panagiotis Papadimitratos and Zygmunt J. Haas. Secure Routing for Mobile Ad Hoc Networks. Working Session on Security in Wireless Ad Hoc Networks, EPFL, (published in Mobile Computing and Communications Review, vol.6, no.4), June 2002.
    • (2002) Mobile Computing and Communications Review , vol.6 , Issue.4
    • Papadimitratos, P.1    Haas, Z.J.2
  • 11
    • 2442582716 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector routing
    • July
    • Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector Routing. ACM Mobile Computing and Communications Review (MC2R), 6(3):106-107, July 2002. also available as http://doi.acm.org/10.1145/581291.581312.
    • (2002) ACM Mobile Computing and Communications Review (MC2R) , vol.6 , Issue.3 , pp. 106-107
    • Zapata, M.G.1
  • 13
    • 85106319926 scopus 로고    scopus 로고
    • A performance comparison of multi-hop wireless ad hoc network routing protocols
    • Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Mobile Computing and Networking, pages 85-97, 1998. also available as http://citeseer.nj.nec.com/broch98performance.html.
    • (1998) Mobile Computing and Networking , pp. 85-97
    • Broch, J.1    Maltz, D.A.2    Johnson, D.B.3    Hu, Y.-C.4    Jetcheva, J.5
  • 14
    • 0004118144 scopus 로고    scopus 로고
    • Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks
    • EPFL-DI-ICA, January
    • Levente Buttyán and Jean-Pierre Hubaux. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical Report DSC/2001/001, EPFL-DI-ICA, January 2001.
    • (2001) Technical Report , vol.DSC-2001-001
    • Buttyán, L.1    Hubaux, J.-P.2
  • 15
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • October
    • Levente Buttyán and Jean-Pierre Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM/Kluwer Mobile Networks and Applications, 8(5), October 2003.
    • (2003) ACM/Kluwer Mobile Networks and Applications , vol.8 , Issue.5
    • Buttyán, L.1    Hubaux, J.-P.2
  • 18
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • San Francisco, CA, April
    • Sheng Zhong, Jiang Chen, and Yang Richard Yang. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of IEEE Infocom '03, San Francisco, CA, April 2003.
    • (2003) Proceedings of IEEE Infocom '03
    • Zhong, S.1    Chen, J.2    Yang Richard Yang3
  • 19
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255-265, 2000. also available as http://citeseer.nj.nec.com/marti00mitigating. html.
    • (2000) Mobile Computing and Networking , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 20
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • Yongguang Zhang and Wenke Lee. Intrusion detection in wireless ad-hoc networks. In Mobile Computing and Networking, pages 275-283, 2000. also available as http://citeseer.nj.nec.com/zhang00intrusion.html.
    • (2000) Mobile Computing and Networking , pp. 275-283
    • Zhang, Y.1    Lee, W.2
  • 21
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • to appear in
    • Yongguang Zhang, Wenke Lee, and Yi-An Huang. Intrusion Detection Techniques for Mobile Wireless Networks. to appear in ACM Wireless Networks (WINET), 9, 2003. also available as http://www.wins.hrl.com/people/ygz/papers/ winet03.pdf.
    • (2003) ACM Wireless Networks (WINET) , vol.9
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3
  • 24
    • 0037885580 scopus 로고    scopus 로고
    • Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
    • Canary Islands, Spain, January. IEEE Computer Society
    • Sonja Buchegger and Jean-Yves Le Boudec. Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, pages 403-410, Canary Islands, Spain, January 2002. IEEE Computer Society, http://citeseer.nj.nec.com/article/buchegger02nodes.html.
    • (2002) Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing , pp. 403-410
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 26
    • 11844293124 scopus 로고    scopus 로고
    • PhD thesis, University of Ulm, Ulm, Germany
    • Frank Kargl. Sicherheit in Mobilen Ad hoc Netzwerken. PhD thesis, University of Ulm, Ulm, Germany, 2003. also available as http://medien. informatik.uni-ulm.de/~frank/research/dissertation.pdf.
    • (2003) Sicherheit in Mobilen Ad Hoc Netzwerken
    • Kargl, F.1
  • 27
    • 0036986441 scopus 로고    scopus 로고
    • An on-demand secure routing protocol resilient to byzantine failures
    • Atlanta, Georgia, September
    • Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru, and Herbert Rubens. An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, September 2002. also available as http://citeseer.nj.nec.com/article/awerbuch02demand.html.
    • (2002) ACM Workshop on Wireless Security (WiSe)
    • Awerbuch, B.1    Holmer, D.2    Nita-Rotaru, C.3    Rubens, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.