메뉴 건너뛰기




Volumn 24, Issue 2, 2006, Pages 329-342

Security and cooperation in clustered mobile ad hoc networks with centralized supervision

Author keywords

Ad hoc networks; Cooperation; HIPERLAN 2; Misbehavior detection; Random walk; Reputation mechanism; Security

Indexed keywords

AD HOC NETWORKS; HIPERLAN/2; MISBEHAVIOR DETECTION; REPUTATION MECHANISM;

EID: 33144467995     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2005.861391     Document Type: Article
Times cited : (19)

References (28)
  • 1
    • 23144452011 scopus 로고    scopus 로고
    • A taxonomy of incentive patterns - The design space of incentives for cooperation
    • May 21. [Online]
    • P. Obreiter and J. Nimis, "A taxonomy of incentive patterns - The design space of incentives for cooperation," Tech. Rep. Nr. 2003-9, May 21, 2003. [Online], Available: http://www.ipd.uka.de/DIANE/en/index.html.
    • (2003) Tech. Rep. Nr. 2003-9 , vol.2003 , Issue.9
    • Obreiter, P.1    Nimis, J.2
  • 2
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • Oct.
    • L. Buttyan and J. P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," ACM/KIuwer Mobile Netw. Appl., vol. 8, no. 5, pp. 579-592, Oct. 2003.
    • (2003) ACM/KIuwer Mobile Netw. Appl. , vol.8 , Issue.5 , pp. 579-592
    • Buttyan, L.1    Hubaux, J.P.2
  • 3
    • 0242527340 scopus 로고    scopus 로고
    • A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
    • Annapolis, MD, June 1-3
    • N. Salem, L. Buttyan, J. P. Hubaux, and M. Jakobsson, "A charging and rewarding scheme for packet forwarding in multi-hop cellular networks, " in Proc. MobiHoc, Annapolis, MD, June 1-3, 2003, pp. 13-24.
    • (2003) Proc. MobiHoc , pp. 13-24
    • Salem, N.1    Buttyan, L.2    Hubaux, J.P.3    Jakobsson, M.4
  • 4
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • San Francisco, CA
    • S. Zhong, J. Chen, and R. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," in Proc. IEEE INFOCOM, San Francisco, CA, 2002, pp. 1987-1997.
    • (2002) Proc. IEEE INFOCOM , pp. 1987-1997
    • Zhong, S.1    Chen, J.2    Yang, R.3
  • 5
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti et al., "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. ACM Int. Conf. Mobile Compu. Netw., MobiCom, 2000, pp. 255-265.
    • (2000) Proc. ACM Int. Conf. Mobile Compu. Netw., MobiCom , pp. 255-265
    • Marti, S.1
  • 6
    • 4544308674 scopus 로고    scopus 로고
    • Observation-based cooperation enforcement in ad hoc networks
    • Stanford Univ., Stanford, CA
    • S. Bansal and M. Baker, "Observation-Based Cooperation Enforcement in Ad hoc Networks," Stanford Univ., Stanford, CA, Res. Rep. cs.NI/0307012, 2003.
    • (2003) Res. Rep. , vol.CS.NI-0307012
    • Bansal, S.1    Baker, M.2
  • 7
    • 12244292723 scopus 로고    scopus 로고
    • Analysis of coalition formation and cooperation strategies in mobile ad hoc networks
    • P. Michiardi and R. Molva, "Analysis of coalition formation and cooperation strategies in mobile ad hoc networks," Ad Hoc Netw. J. (Special Issue), vol. 3, no. 2, pp. 193-219, 2003.
    • (2003) Ad Hoc Netw. J. (Special Issue) , vol.3 , Issue.2 , pp. 193-219
    • Michiardi, P.1    Molva, R.2
  • 8
    • 84858533117 scopus 로고    scopus 로고
    • Game theoretic analysis of cooperation enforcement in mobile ad hoc networks
    • Oct. 2003. [Online].
    • _, "Game theoretic analysis of cooperation enforcement in mobile ad hoc networks," Res. Rep. RR-03-092, Oct. 2003. [Online]. Available: http://www.eurecom.fr/~michiard/pub.html.
    • Res. Rep. , vol.RR-03-092
  • 10
    • 33745900048 scopus 로고    scopus 로고
    • A robust reputation system for P2P and mobile ad-hoc networks
    • Jun. 2004. [Online]
    • _, "A robust reputation system for P2P and mobile ad-hoc networks," in Proc. 2nd Workshop on the Economics of Peer-to-Peer Syst., Jun. 2004. [Online], Available: www.eecs.harvard.edu/p2pecon/confman/papers/s2p2.pdf.
    • Proc. 2nd Workshop on the Economics of Peer-to-Peer Syst.
  • 11
    • 11244250305 scopus 로고    scopus 로고
    • The effect of rumor spreading in reputation systems for mobile ad-hoc networks
    • [Online]
    • _, "The effect of rumor spreading in reputation systems for mobile ad-hoc networks," in Proc. Modeling and Optimization in Mobile Ad Hoc and Wireless Networks, 2003. [Online], Available: www.sims.berkeley.edu/-sonja/effect.pdf.
    • (2003) Proc. Modeling and Optimization in Mobile Ad Hoc and Wireless Networks
  • 12
    • 84943576414 scopus 로고    scopus 로고
    • Friends and foes: Preventing selfishness in open mobile ad hoc networks
    • Providence, RI, May
    • H. Miranda and L. Rodrigues, "Friends and foes: Preventing selfishness in open mobile ad hoc networks," in Proc. Int. Workshop on Mobile. Distrib. Comput., Providence, RI, May 2003, pp. 440-445.
    • (2003) Proc. Int. Workshop on Mobile. Distrib. Comput. , pp. 440-445
    • Miranda, H.1    Rodrigues, L.2
  • 13
    • 27844495331 scopus 로고    scopus 로고
    • BROADWAY - The way to broadband access at 60 GHz
    • Thessaloniki, Greece, Jun. [Online]
    • M. de Courville, S. Zeisberg, M. Muck, and J. Schönthier, "BROADWAY - The way to broadband access at 60 GHz," in Proc. 1st Mobile Wireless Telecom. Summit, Thessaloniki, Greece, Jun. 2002. [Online]. Available: www.ist-broadway.org/documents/papers/ 200206-ist_summit_greece_thessaloniki-broadway.pdf.
    • (2002) Proc. 1st Mobile Wireless Telecom. Summit
    • De Courville, M.1    Zeisberg, S.2    Muck, M.3    Schönthier, J.4
  • 14
    • 28244480158 scopus 로고    scopus 로고
    • A centralized ad-hoc network architecture (CANA) based on enhanced HiperLAN/2
    • Beijing, China, Sep. 7-10
    • K. Oikonomou et al., "A centralized ad-hoc network architecture (CANA) based on enhanced HiperLAN/2," in Proc. 14th IEEE PIMRC, Beijing, China, Sep. 7-10, 2003, pp. 1336-1340.
    • (2003) Proc. 14th IEEE PIMRC , pp. 1336-1340
    • Oikonomou, K.1
  • 16
    • 33144460704 scopus 로고    scopus 로고
    • Broadband radio access networks (BRAN); HIPERLAN type 2; Data link control (DLC) layer Part 1: Basic data transport functions
    • Tech. Spec., Apr.
    • "Broadband radio access networks (BRAN); HIPERLAN type 2; Data link control (DLC) layer Part 1: Basic data transport functions," ETSI TS 101 761-1, Tech. Spec., Apr. 2000.
    • (2000) ETSI TS 101 761-1
  • 17
    • 33144472761 scopus 로고    scopus 로고
    • Broadband radio access networks (BRAN); HIPERLAN Type 2; Data link control (DLC) layer Part 2: Radio link control (RLC) sublayer
    • Tech. Spec., Apr.
    • "Broadband radio access networks (BRAN); HIPERLAN Type 2; Data link control (DLC) layer Part 2: Radio link control (RLC) sublayer," ETSI TS 101 761-2, Tech. Spec., Apr. 2000.
    • (2000) ETSI TS 101 761-2
  • 20
    • 2342528393 scopus 로고    scopus 로고
    • Stationary distributions for the random way-point mobility model
    • Jan.-Mar.
    • W. Navidi and T. Camp, "Stationary distributions for the random way-point mobility model," IEEE Trans. Mobile Comput., vol. 3, no. 1, pp. 99-108, Jan.-Mar. 2004.
    • (2004) IEEE Trans. Mobile Comput. , vol.3 , Issue.1 , pp. 99-108
    • Navidi, W.1    Camp, T.2
  • 21
  • 23
    • 0031703272 scopus 로고    scopus 로고
    • Detecting disruptive routers: A distributed network monitoring approach
    • May
    • K. Bradley et al., "Detecting disruptive routers: a distributed network monitoring approach," in Proc. IEEE Symp. Security and Privacy, May 1998, pp. 115-124.
    • (1998) Proc. IEEE Symp. Security and Privacy , pp. 115-124
    • Bradley, K.1
  • 24
    • 4944220325 scopus 로고    scopus 로고
    • The beta reputation system
    • Bled, Slovenia, Jun. [Online]
    • A. Josang and R. Ismail, "The beta reputation system," in Proc. 15th Bled Electronic Commerce Conf., Bled, Slovenia, Jun. 2002. [Online], Available: security.dstc.edu.au/papers/JI2002-Bled.pdf.
    • (2002) Proc. 15th Bled Electronic Commerce Conf.
    • Josang, A.1    Ismail, R.2
  • 25
    • 15744368857 scopus 로고    scopus 로고
    • Efficient and secure source authentication for multicast
    • San Diego, CA. [Online]
    • A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Proc. Netw, Distri. Syst. Security Symp, San Diego, CA, 2001. [Online]. Available: www.isoc.org/isoc/conferences/ndss/01/2001/papers/perrig.pdf.
    • (2001) Proc. Netw, Distri. Syst. Security Symp
    • Perrig, A.1    Canetti, R.2    Song, D.3    Tygar, D.4
  • 26
  • 27
    • 2642549561 scopus 로고    scopus 로고
    • WLAN security - Status, problems and perspective
    • Florence, Italy, Feb. [Online]
    • M. Casole, "WLAN security - status, problems and perspective," in Proc. Eur. Wireless, Florence, Italy, Feb. 2002. [Online]. Available: docenti.ing.unipi.it/ew2002/proceedings/sec002.pdf.
    • (2002) Proc. Eur. Wireless
    • Casole, M.1
  • 28
    • 28244465434 scopus 로고    scopus 로고
    • Enhancing HIPERLAN/2 security aspects
    • Madonna di Campiglio, Italy, Jan.
    • J. Ferrer et al., "Enhancing HIPERLAN/2 security aspects," in Proc. WONS, Madonna di Campiglio, Italy, Jan. 2004, pp. 389-394.
    • (2004) Proc. WONS , pp. 389-394
    • Ferrer, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.