메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 2-11

Certain limitations of reputation-based schemes in mobile environments

Author keywords

Cooperation; Mobile ad hoc networks; Reputation; Trust

Indexed keywords

COMPUTER SIMULATION; ENERGY UTILIZATION; PACKET NETWORKS; SECURITY OF DATA;

EID: 33748966621     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (18)

References (16)
  • 1
    • 3042542420 scopus 로고    scopus 로고
    • Simulation-based analysis of security exposures in mobile ad hoc networks
    • Florence, Italy, Februry
    • Pietro Michiardi and Refik Molva. Simulation-based analysis of security exposures in mobile ad hoc networks. In Proceedings of European Wireless 2002, Florence, Italy, Februry 2002.
    • (2002) Proceedings of European Wireless 2002
    • Michiardi, P.1    Molva, R.2
  • 2
    • 0004118144 scopus 로고    scopus 로고
    • Nuglets: A virtual currency to stimulate cooperation in self-organized ad hoc networks
    • Swiss Federal Institute of Technology, Lausanne, Switzerland
    • Levente Buttyán and Jean-Pierre Hubaux. Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology, Lausanne, Switzerland, 2001.
    • (2001) Technical Report , vol.DSC-2001-001
    • Buttyán, L.1    Hubaux, J.-P.2
  • 3
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks
    • San Francisco, California, USA, March
    • Sheng Zhong, Jiang Chen, and Yang Richard Yang. Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks. In Proceedings of IEEE INFOCOM 2003, San Francisco, California, USA, March 2003.
    • (2003) Proceedings of IEEE INFOCOM 2003
    • Zhong, S.1    Chen, J.2    Yang, R.3
  • 6
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • T. Imielinski and H. Korth, editors. Kluwer
    • David B. Johnson and David A. Maltz. Dynamic source routing in ad hoc wireless networks. In T. Imielinski and H. Korth, editors, Mobile Computing, volume 353. Kluwer, 1996.
    • (1996) Mobile Computing , vol.353
    • Johnson, D.B.1    Maltz, D.A.2
  • 8
    • 4444276583 scopus 로고    scopus 로고
    • A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks
    • Sophia-Antipolis, France, March
    • Pietro Michiardi and Refik Molva. A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks. In Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt '03), Sophia-Antipolis, France, March 2003.
    • (2003) Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt '03)
    • Michiardi, P.1    Molva, R.2
  • 9
    • 1542358393 scopus 로고    scopus 로고
    • Game theoretic analysis of security in mobile ad hoc networks
    • Institut Eurecom, Sophia-Antipolis, France, April
    • Pietro Michiardi and Refik Molva. Game theoretic analysis of security in mobile ad hoc networks. Technical Report RR-02-070, Institut Eurecom, Sophia-Antipolis, France, April 2002.
    • (2002) Technical Report , vol.RR-02-070
    • Michiardi, P.1    Molva, R.2
  • 10
    • 33748961934 scopus 로고    scopus 로고
    • Game theoretic analysis of cooperation enforcement in mobile ad hoc networks
    • Institut Eurecom, Sophia-Antipolis, France, October
    • Pietro Michiardi and Refik Molva. Game theoretic analysis of cooperation enforcement in mobile ad hoc networks. Technical Report RR-03-092, Institut Eurecom, Sophia-Antipolis, France, October 2003.
    • (2003) Technical Report , vol.RR-03-092
    • Michiardi, P.1    Molva, R.2
  • 11
    • 0035015898 scopus 로고    scopus 로고
    • Investigating the energy consumption of a wireless network interface in an ad hoc networking environment
    • Anchorage, Alaska, USA, April
    • Laura M. Feeney and Martin Nilsson. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In Proceedings of IEEE INFOCOM 2001, pages 1548-1557, Anchorage, Alaska, USA, April 2001.
    • (2001) Proceedings of IEEE INFOCOM 2001 , pp. 1548-1557
    • Feeney, L.M.1    Nilsson, M.2
  • 12
    • 33748972409 scopus 로고    scopus 로고
    • Exploiting mobility in ad-hoc wireless networks with incentives
    • University of Massachusetts, Computer Science Department, Amherst, Massachusetts, USA, July
    • Daniel R. Figueiredo, Michele Garetto, and Don Towsley. Exploiting mobility in ad-hoc wireless networks with incentives. Technical Report CMPSCI-04-66, University of Massachusetts, Computer Science Department, Amherst, Massachusetts, USA, July 2004.
    • (2004) Technical Report , vol.CMPSCI-04-66
    • Figueiredo, D.R.1    Garetto, M.2    Towsley, D.3
  • 13
    • 1542325545 scopus 로고    scopus 로고
    • Topology control protocols to conserve energy in wireless ad hoc networks
    • University of California, Los Angeles, Center for Embedded Networked Computing, January
    • Ya Xu, Solomon Bien, Yutaka Mori, John Heidemann, and Deborah Estrin. Topology control protocols to conserve energy in wireless ad hoc networks. Technical Report 6, University of California, Los Angeles, Center for Embedded Networked Computing, January 2003.
    • (2003) Technical Report , vol.6
    • Xu, Y.1    Bien, S.2    Mori, Y.3    Heidemann, J.4    Estrin, D.5
  • 14
    • 0036670170 scopus 로고    scopus 로고
    • Mobility increases the capacity of ad hoc wireless networks
    • August
    • Matthias Grossglauser and David N. C. Tse. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Transactions on Networking, 10(4):477-486, August 2002.
    • (2002) IEEE/ACM Transactions on Networking , vol.10 , Issue.4 , pp. 477-486
    • Grossglauser, M.1    Tse, D.N.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.