메뉴 건너뛰기




Volumn 34, Issue 2, 2006, Pages 272-276

Research on security mechanism based on AODV routing protocol in mobile Ad Hoc network

Author keywords

Ad Hoc on demand distance vector; Attack detection; Credence; Mobile Ad Hoc network; Routing security

Indexed keywords

COMPUTER NETWORKS; COMPUTER SIMULATION; IMPROVEMENT; NETWORK PROTOCOLS; VECTORS;

EID: 33646347141     PISSN: 03722112     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (4)

References (13)
  • 2
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile Ad Hoc networks: Challenges and solutions
    • Yang H. Security in mobile Ad Hoc networks: Challenges and solutions[J]. IEEE Wireless Communications, 2004, 11(1): 38-47.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1
  • 3
    • 0003843664 scopus 로고    scopus 로고
    • Ad hoc on-demand distance vector (AODV) routing
    • Charles E Perkins, Elizabeth M Belding Royer, Samir R Das. Ad hoc on-demand distance vector (AODV) routing[EB/OL]. http://www.ietf.org/rfc/rfc3561.txt, 2003-07.
    • (2003)
    • Perkins, C.E.1    Royer, E.M.B.2    Das, S.R.3
  • 4
    • 33646344900 scopus 로고    scopus 로고
    • Security in Ad Hoc networks: Protocols and ECC on embedded system
    • Bochum: Ruhr University
    • Ingo Riedel. Security in Ad Hoc networks: Protocols and ECC on Embedded System[D]. Bochum: Ruhr University, 2003.
    • (2003)
    • Riedel, I.1
  • 5
    • 33646340344 scopus 로고    scopus 로고
    • Three attack methods to AODV and corresponding solutions
    • Chinese source
    • Xie Dong-li, Zhou Xiao-feng. Three attack methods to AODV and corresponding solutions[J]. Jisuanji yu Xiandaihua, 2004, (10): 101-104. (in Chinese)
    • (2004) Jisuanji Yu Xiandaihua , Issue.10 , pp. 101-104
    • Xie, D.-L.1    Zhou, X.-F.2
  • 8
    • 0004118144 scopus 로고    scopus 로고
    • A virtual currency to simulate cooperation in self-organized Ad Hoc network
    • Swiss: Swiss Federa Institute of Technology-Lausanne
    • Butty'an L, Phuhaux J, Nuglets. A virtual currency to simulate cooperation in self-organized Ad Hoc network[R]. Swiss: Swiss Federa Institute of Technology-Lausanne, 2001.
    • (2001)
    • Butty'an, L.1    Phuhaux, J.2    Nuglets3
  • 9
    • 85113133621 scopus 로고    scopus 로고
    • CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • Slovenia: Portoroz
    • Pietro michiardi, Refik molva. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks[A]. Sixth IFIP conference on security communications, and multimedia (CMS 2002)[C]. Slovenia: Portoroz, 2002.107-121.
    • (2002) Sixth IFIP conference on security communications, and multimedia (CMS 2002) , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 10
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Yongguang Zhang, Wenke Lee. Intrusion detection techniques for mobile wireless networks[J]. Wireless Networks, 2003, 9(5): 545-556.
    • (2003) Wireless Networks , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2
  • 11
    • 33646347563 scopus 로고    scopus 로고
    • A mobile Agent based IDS model for MANET
    • Chinese source
    • Li Ling-juan, Wang Ru-chuan. A mobile Agent based IDS model for MANET[J]. Computer Engineering and Applications, 2005, (20): 139-141. (in Chinese)
    • (2005) Computer Engineering and Applications , Issue.20 , pp. 139-141
    • Li, L.-J.1    Wang, R.-C.2
  • 12
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in wireless Ad Hoc networks
    • Hongmei Deng, Wei Li. Routing security in wireless Ad Hoc networks[J]. IEEE Communication Magazine, 2002, 40(10): 70-75.
    • (2002) IEEE Communication Magazine , vol.40 , Issue.10 , pp. 70-75
    • Deng, H.1    Li, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.