메뉴 건너뛰기




Volumn 6, Issue 3, 2006, Pages 319-332

Cooperation enforcement schemes for MANETs: A survey

Author keywords

Cooperation enforcement; Mobile ad hoc networks; Selfishness; Trust establishment

Indexed keywords

COOPERATION- ENFORCEMENT; MOBILE AD HOC NETWORKS; SELFISHNESS; TRUST ESTABLISHMENT;

EID: 33646845802     PISSN: 15308669     EISSN: None     Source Type: Journal    
DOI: 10.1002/wcm.398     Document Type: Review
Times cited : (78)

References (43)
  • 4
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Imielinski T, Korth H (eds). Kluwer Academic Publishers: Boston
    • Johnson DB, Maltz DA. Dynamic source routing in ad hoc wireless networks. In Mobile Computing, Imielinski T, Korth H (eds). Kluwer Academic Publishers: Boston, 1996; 153-181.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 5
    • 0031353437 scopus 로고    scopus 로고
    • A highly adaptive distributed routing algorithm for mobile wireless networks
    • April
    • Park VD, Corson MS. A highly adaptive distributed routing algorithm for mobile wireless networks. In Proceedings of IEEE INFOCOM'97, April 1997.
    • (1997) Proceedings of IEEE INFOCOM'97
    • Park, V.D.1    Corson, M.S.2
  • 10
    • 0012575586 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Department of Computer Science, Rice University, December
    • Hu YC, Perrig A, Johnson DB. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. Technical Report TR01-384, Department of Computer Science, Rice University, December 2001.
    • (2001) Technical Report TR01-384
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 13
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L, Haas Z. Securing ad hoc networks. IEEE Network 1999; 13(6): 24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 14
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Communications of the ACM 1979; 22(11): 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 18
    • 33646852748 scopus 로고    scopus 로고
    • BISS: Building secure routing out of an incomplete set of security associations
    • September
    • Capkun S, Hubaux JP. BISS: building secure routing out of an incomplete set of security associations. In Proceedings of ACM WiSe2003, September 2003.
    • (2003) Proceedings of ACM WiSe2003
    • Capkun, S.1    Hubaux, J.P.2
  • 21
    • 15344348312 scopus 로고    scopus 로고
    • Secure routing with tamper resistant module for mobile ad hoc networks
    • June
    • Song JH, Wong H, Leung V, et al. Secure routing with tamper resistant module for mobile ad hoc networks. In Proceedings of ACM MobiHoc2003, June 2003.
    • (2003) Proceedings of ACM MobiHoc2003
    • Song, J.H.1    Wong, H.2    Leung, V.3
  • 22
    • 33646840438 scopus 로고    scopus 로고
    • The secure routing protocol (SRP) for ad hoc networks
    • Work in progress, December
    • Papadimitratos P, Haas ZJ, Samar P. The secure routing protocol (SRP) for ad hoc networks. IETF Internet Draft, Work in progress, December 2002.
    • (2002) IETF Internet Draft
    • Papadimitratos, P.1    Haas, Z.J.2    Samar, P.3
  • 27
    • 11244250305 scopus 로고    scopus 로고
    • The effect of rumour spreading in reputation systems for mobile ad-hoc networks
    • March
    • Buchegger S, Le Boudec JY. The effect of rumour spreading in reputation systems for mobile ad-hoc networks. In Proceedings of WiOpt03, March 2003.
    • (2003) Proceedings of WiOpt03
    • Buchegger, S.1    Le Boudec, J.Y.2
  • 28
    • 14844335451 scopus 로고    scopus 로고
    • Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks
    • Ecole Polytechnique Federale de Lausanne, May
    • Buchegger S, Le Boudec JY. Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks. Technical Report IC/2003/31, Ecole Polytechnique Federale de Lausanne, May 2003.
    • (2003) Technical Report IC/2003/31
    • Buchegger, S.1    Le Boudec, J.Y.2
  • 31
    • 4544308674 scopus 로고    scopus 로고
    • Observation-based cooperation enforcement in ad-hoc networks
    • Stanford University
    • Bansal S, Baker M. Observation-based cooperation enforcement in ad-hoc networks. Techical Report, Stanford University, 2003.
    • (2003) Techical Report
    • Bansal, S.1    Baker, M.2
  • 32
    • 4544283175 scopus 로고    scopus 로고
    • SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks
    • March
    • He Q, Wu D, Khosla P. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks. In Proceedings of IEEE WCNC2004, March 2004.
    • (2004) Proceedings of IEEE WCNC2004
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 35
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • April
    • Zhong S, Chen J, Yang R. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of IEEE INFOCOM2003, April 2003.
    • (2003) Proceedings of IEEE INFOCOM2003
    • Zhong, S.1    Chen, J.2    Yang, R.3
  • 36
    • 1842693647 scopus 로고    scopus 로고
    • Self-organized network-layer security in mobile ad hoc networks
    • September
    • Yang H, Meng X, Lu S. Self-organized network-layer security in mobile ad hoc networks. In Proceedings of ACM WiSe02, September 2002.
    • (2002) Proceedings of ACM WiSe02
    • Yang, H.1    Meng, X.2    Lu, S.3
  • 40
    • 0004118144 scopus 로고    scopus 로고
    • Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks
    • EPFL, January
    • Buttyan L, Hubaux JP. Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical Report No. DSC/2001/001, EPFL, January 2001.
    • (2001) Technical Report No. DSC/2001/001
    • Buttyan, L.1    Hubaux, J.P.2
  • 41
    • 0031078841 scopus 로고    scopus 로고
    • Trusting mobile user devices and security modules
    • February
    • Pfitzmann A, Pfitzmann B, Waidner M. Trusting mobile user devices and security modules. IEEE Computer, February 1997, 61-68.
    • (1997) IEEE Computer , pp. 61-68
    • Pfitzmann, A.1    Pfitzmann, B.2    Waidner, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.