메뉴 건너뛰기




Volumn 30, Issue 1, 2007, Pages 145-166

Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol

Author keywords

AODV routing protocol; Intrusion detection and response; Multi agent dynamic lifetime; Performance evaluation; Trustworthiness

Indexed keywords

ALGORITHMS; COMPUTATIONAL COMPLEXITY; COMPUTER NETWORKS; COMPUTER SIMULATION; ENERGY UTILIZATION; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33750523444     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2005.09.006     Document Type: Article
Times cited : (34)

References (13)
  • 1
    • 4143084830 scopus 로고    scopus 로고
    • Hongmei D, Qing-An Z, Dharma PA. SVM-based intrusion detection system for wireless ad hoc networks. In: Proceedings of the IEEE vehicular technology conference (VTC '03), Orlando, October 6-9, 2003.
  • 2
    • 33750519124 scopus 로고    scopus 로고
    • http://www.isi.edu/nsnam/ns
  • 3
    • 84961572484 scopus 로고    scopus 로고
    • Hu Y, Johnson DB, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Fourth IEEE workshop on mobile computing systems and applications (WMCSA '02), 2002a.
  • 4
    • 85177161028 scopus 로고    scopus 로고
    • Hu Y, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of the eighth annual international conference on mobile computing and networking (MobiCom '02), 2002b.
  • 5
    • 84969513597 scopus 로고    scopus 로고
    • Kachirski O, Guha R. Effective intrusion detection using multiple sensors in wireless ad hoc networks. In: Proceedings of the 36th Hawaii international conference on system sciences (HICSS '03), vol. 02, February 2003. p. 57-65.
  • 6
    • 33750505752 scopus 로고    scopus 로고
    • Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. In: First IEEE international workshop on sensor network protocols and applications, 2003. p. 1-15.
  • 7
    • 12444250094 scopus 로고    scopus 로고
    • ACAI: agent-based context-aware infrastructure for spontaneous applications
    • Khedr M., and Karmouch A. ACAI: agent-based context-aware infrastructure for spontaneous applications. J Network Comput Appl 28 1 (2005) 9-44
    • (2005) J Network Comput Appl , vol.28 , Issue.1 , pp. 9-44
    • Khedr, M.1    Karmouch, A.2
  • 8
    • 10844230994 scopus 로고    scopus 로고
    • Intrusion detection using an ensemble of intelligent paradigms
    • Mukkamala S., Sung A.H., and Abraham A. Intrusion detection using an ensemble of intelligent paradigms. J Network Comput Appl 28 2 (2005) 167-182
    • (2005) J Network Comput Appl , vol.28 , Issue.2 , pp. 167-182
    • Mukkamala, S.1    Sung, A.H.2    Abraham, A.3
  • 9
    • 33750525878 scopus 로고    scopus 로고
    • Perkins, E., Das, S. Ad hoc on-demand distance vector (AODV) routing. Internet Draft, draft-ietf-manet-aodv-13.txt, February 2003.
  • 10
    • 0032630377 scopus 로고    scopus 로고
    • Intelligent mobile agents in large distributed systems
    • Wong S., Johnny K., and Armin M.R. Intelligent mobile agents in large distributed systems. J Syst Software 47 (1999) 75-87
    • (1999) J Syst Software , vol.47 , pp. 75-87
    • Wong, S.1    Johnny, K.2    Armin, M.R.3
  • 11
    • 33750496677 scopus 로고    scopus 로고
    • Zapata MG. Secure ad hoc on-demand distance vector (SAODV) routing. IETF Internet Draft, draft-guerrero-manet-saodv-00.txt, August 2001.
  • 12
    • 85177500015 scopus 로고    scopus 로고
    • Zhang Y, Lee W. Intrusion detection in wireless ad hoc networks. In: Proceedings of the sixth annual international conference on mobile computing and networking (MobiCom 2000), August, 2000. p. 275-83.
  • 13
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L., and Haas Z.J. Securing ad hoc networks. J IEEE Networks 13 6 (1999) 24-30
    • (1999) J IEEE Networks , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.