메뉴 건너뛰기




Volumn 29, Issue 15, 2006, Pages 2806-2821

Incorporating trust and reputation in the DSR protocol for dependable routing

Author keywords

Ad hoc; Network; Routing Protocol; Security; Trust

Indexed keywords

COMMUNICATION SYSTEMS; INFORMATION DISSEMINATION; MATHEMATICAL MODELS; PACKET NETWORKS;

EID: 33747431615     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2005.10.032     Document Type: Article
Times cited : (30)

References (28)
  • 1
    • 33747395930 scopus 로고    scopus 로고
    • S. Corson, J. Macker, Mobile Ad-hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, IETF MANET, RFC 2501, 1999.
  • 2
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad hoc mobile wireless networks
    • Royer E.M., and Toh C.K. A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications Magazine 6 2 (1999) 46-55
    • (1999) IEEE Personal Communications Magazine , vol.6 , Issue.2 , pp. 46-55
    • Royer, E.M.1    Toh, C.K.2
  • 4
    • 85177163402 scopus 로고    scopus 로고
    • Y.C. Hu, A. Perrig, D.B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks, Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom) (2002) 12-23.
  • 5
    • 84904904836 scopus 로고    scopus 로고
    • B. Dahill, B.N. Levine, E. Royer, C. Shields, A secure routing protocol for ad hoc networks, Proceedings of the International Conference on Network Protocols (ICNP) (2002) 78-87.
  • 6
    • 33646421331 scopus 로고    scopus 로고
    • Secure routing protocols for mobile ad-hoc wireless networks
    • Wysocki T.A., Dadej A., and Wysocki B.J. (Eds), Springer
    • Pirzada A.A., and McDonald C. Secure routing protocols for mobile ad-hoc wireless networks. In: Wysocki T.A., Dadej A., and Wysocki B.J. (Eds). Advanced Wired and Wireless Networks (2004), Springer
    • (2004) Advanced Wired and Wireless Networks
    • Pirzada, A.A.1    McDonald, C.2
  • 8
    • 85177502300 scopus 로고    scopus 로고
    • S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom) (2000) 255-265.
  • 9
    • 0003597247 scopus 로고    scopus 로고
    • The dynamic source routing protocol for mobile ad hoc networks (dsr)
    • Johnson D.B., Maltz D.A., and Hu Y. The dynamic source routing protocol for mobile ad hoc networks (dsr). IETF MANET, Internet Draft (2004)
    • (2004) IETF MANET, Internet Draft
    • Johnson, D.B.1    Maltz, D.A.2    Hu, Y.3
  • 10
    • 0242696192 scopus 로고    scopus 로고
    • S. Buchegger, J. Boudec, Performance analysis of the confidant protocol: Cooperation of nodes - fairness in distributed ad-hoc networks, Proceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC) (2002) 226-236.
  • 11
    • 33747391691 scopus 로고    scopus 로고
    • F. Stajano, R. Anderson, The resurrecting duckling: Security issues for ad hoc wireless networks, Proceedings of the 7th International Workshop on Security Protocols (1999) 172-194.
  • 13
    • 84944881532 scopus 로고    scopus 로고
    • A. Nasipuri, S. Das, On-demand multipath routing for mobile ad hoc networks, Proceedings of the Eight International Conference on Computer Communications and Networks (1999) 64-70.
  • 14
    • 85177499606 scopus 로고    scopus 로고
    • Y.C. Hu, D.B. Johnson, Caching strategies in on-demand routing protocols for wireless ad hoc networks, Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom) (2000) 231-242.
  • 16
    • 33744930499 scopus 로고    scopus 로고
    • Reliable routing in ad-hoc networks using direct trust mechanisms (to appear)
    • Du D.Z., and Xue G. (Eds), Springer
    • Pirzada A.A., and McDonald C. Reliable routing in ad-hoc networks using direct trust mechanisms (to appear). In: Du D.Z., and Xue G. (Eds). Advances in Wireless Networks and Mobile Computing (2005), Springer
    • (2005) Advances in Wireless Networks and Mobile Computing
    • Pirzada, A.A.1    McDonald, C.2
  • 17
    • 33747421133 scopus 로고    scopus 로고
    • A.A. Pirzada, A. Datta, C. McDonald, Propagating trust in ad-hoc networks for reliable routing, Proceedings of the International Workshop on Wireless Ad-hoc Networks (IWWAN)(2004).
  • 18
    • 33747403170 scopus 로고    scopus 로고
    • T. Beth, M. Borcherding, B. Klein, Valuation of trust in open networks, Proceedings of the Third European Symposium on Research in Computer Security (ESORICS) (1994) 3-18.
  • 20
    • 84994155710 scopus 로고    scopus 로고
    • A.A. Rahman, S. Hailes, A distributed trust model, Proceedings of the ACM New Security Paradigms Workshop (1997) 48-60.
  • 21
    • 0001591557 scopus 로고
    • A note on two problems in connection with graphs
    • Dijkstra E.W. A note on two problems in connection with graphs. Numerische Mathematik (1959) 83-89
    • (1959) Numerische Mathematik , pp. 83-89
    • Dijkstra, E.W.1
  • 22
    • 33747425691 scopus 로고    scopus 로고
    • NS, The network simulator, http://www.isi.edu/nsnam/ns/, 1989.
  • 23
    • 0036998591 scopus 로고    scopus 로고
    • Inter-relationships of performance metrics and system parameters in mobile ad hoc networks
    • Yuen W.H., and Yates R.D. Inter-relationships of performance metrics and system parameters in mobile ad hoc networks. Proceedings of the IEEE MILCOM (2002) 519-524
    • (2002) Proceedings of the IEEE MILCOM , pp. 519-524
    • Yuen, W.H.1    Yates, R.D.2
  • 24
    • 0035360627 scopus 로고    scopus 로고
    • An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks
    • Feeney L. An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks. Mobile Networks and Applications 6 3 (2001) 239-249
    • (2001) Mobile Networks and Applications , vol.6 , Issue.3 , pp. 239-249
    • Feeney, L.1
  • 26
    • 11244252132 scopus 로고    scopus 로고
    • I. Aad, J.-P. Hubaux, E.W. Knightly, Denial of service resilience in ad hoc networks, Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom) (2004) 202-215.
  • 27
    • 85177499613 scopus 로고    scopus 로고
    • Y. Zhang, W. Lee, Intrusion detection in wireless ad hoc networks, Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom) (2000) 275-283.
  • 28
    • 84950162203 scopus 로고    scopus 로고
    • O. Kachirski, R. Guha, Intrusion detection using mobile agents in wireless ad hoc networks, Proceedings of the IEEE Workshop on Knowledge Media Networking (KMN) (2002) 153-158.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.