메뉴 건너뛰기




Volumn , Issue , 2005, Pages 12-21

Secure reporting of traffic forwarding activity in mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

CIVILIAN NETWORKS; DIRECTIONAL ANTENNAS; MOBILE AD HOC NETWORKS; NEIGHBOR MONITORING;

EID: 33749515007     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBIQUITOUS.2005.53     Document Type: Conference Paper
Times cited : (4)

References (20)
  • 2
    • 0242453865 scopus 로고    scopus 로고
    • An on-demand secure routing protocol resilient to byzantine failures
    • B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens. An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. ACM WiSe, 2002.
    • (2002) ACM WiSe
    • Awerbuch, B.1    Holmer, D.2    Nita-Rotaru, C.3    Rubens, H.4
  • 3
    • 2442597363 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol(cooperation of nodes: Fairness in dynamic ad-hoc neTworks)
    • S. Buchegger and J.-Y. L. Boudec. Performance Analysis of the CONFIDANT Protocol(Cooperation Of Nodes: Fairness in Dynamic Ad-hoc NeTworks). MOBIHOC, 2002.
    • (2002) MOBIHOC
    • Buchegger, S.1    Boudec, J.-Y.L.2
  • 6
    • 0003418317 scopus 로고
    • P. J. transmission control protocol - DARPA internet protocol program specification
    • Sep. RFC 793
    • P. J. Transmission Control Protocol - DARPA Internet Protocol Program Specification. IETF, Sep. 1981. RFC 793.
    • (1981) IETF
  • 11
    • 23044531795 scopus 로고    scopus 로고
    • Micropayments revisited
    • S. Micali and R. Rivest. Micropayments Revisited. CT-RSA, 2002.
    • (2002) CT-RSA
    • Micali, S.1    Rivest, R.2
  • 12
    • 85113133621 scopus 로고    scopus 로고
    • CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • P. Michiardi and R. Molva. CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad Hoc Networks. In Proceedings of The 6th IFIP, 2002.
    • (2002) Proceedings of the 6th IFIP
    • Michiardi, P.1    Molva, R.2
  • 13
    • 0742292815 scopus 로고    scopus 로고
    • Ad hoc On-Demand Distance Vector (AODV) routing
    • C. E. Perkins and E. Belding-Royer. Ad hoc On-Demand Distance Vector (AODV) Routing. IETF RFC3561, 2003.
    • (2003) IETF RFC3561
    • Perkins, C.E.1    Belding-Royer, E.2
  • 15
    • 0034512956 scopus 로고    scopus 로고
    • Malicious packet dropping: How it might impact the TCP performance and how we can detect it
    • Nov.
    • X. Zhang, S. Wu, Z. Fu, and T.-L. Wu. Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It. In Proceedings of ICNP 2000, Nov. 2000.
    • (2000) Proceedings of ICNP 2000
    • Zhang, X.1    Wu, S.2    Fu, Z.3    Wu, T.-L.4
  • 17
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Y. Zhang and W. Lee. Intrusion Detection in Wireless Ad Hoc Networks. Proc. of ACM Mobicom, 2000.
    • (2000) Proc. of ACM Mobicom
    • Zhang, Y.1    Lee, W.2
  • 18
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simpe, cheat-proof, credit-based system for mobile ad-hoc networks
    • S. Zhone, J. Chen, and Y R. Yang. Sprite: A Simpe, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. Proc. of IEEE INFOCOM, 2003.
    • (2003) Proc. of IEEE INFOCOM
    • Zhone, S.1    Chen, J.2    Yang, Y.R.3
  • 19
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning. An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In Proc. of IEEE Symposium on Security and Privacy, 2004.
    • (2004) Proc. of IEEE Symposium on Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.