메뉴 건너뛰기




Volumn 6, Issue 5, 2007, Pages 536-550

An acknowledgment-based approach for the detection of routing misbehavior in MANETs

Author keywords

Dynamic source routing (DSR); Mobile ad hoc networks (MANETs); Network security; Node misbehavior; Routing misbehavior

Indexed keywords

AD HOC NETWORKS; COMPUTER SIMULATION; MAINTENANCE; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; PACKET NETWORKS;

EID: 33947624156     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2007.1036     Document Type: Article
Times cited : (358)

References (32)
  • 3
    • 0035015898 scopus 로고    scopus 로고
    • Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment
    • L.M. Feeney and M. Nilsson, "Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment," Proc. IEEE INFOCOM, 2001.
    • (2001) Proc. IEEE INFOCOM
    • Feeney, L.M.1    Nilsson, M.2
  • 4
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
    • Aug
    • S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. MobiCom, Aug. 2000.
    • (2000) Proc. MobiCom
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 5
    • 84954161437 scopus 로고    scopus 로고
    • Enforcing Service Availability in Mobile Ad-Hoc WANs
    • Aug
    • L. Buttyan and J.-P. Hubaux, "Enforcing Service Availability in Mobile Ad-Hoc WANs," Proc. MobiHoc, Aug. 2000.
    • (2000) Proc. MobiHoc
    • Buttyan, L.1    Hubaux, J.-P.2
  • 7
    • 2642586050 scopus 로고    scopus 로고
    • Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks
    • June
    • S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks," Proc. MobiHoc, June 2002.
    • (2002) Proc. MobiHoc
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 8
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks
    • Mar.-Apr
    • S. Zhong, J. Chen, and Y.R. Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks," Proc. INFOCOM, Mar.-Apr. 2003.
    • (2003) Proc. INFOCOM
    • Zhong, S.1    Chen, J.2    Yang, Y.R.3
  • 11
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc Networks
    • Nov./Dec
    • L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, Nov./Dec. 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.J.2
  • 16
    • 2342630172 scopus 로고    scopus 로고
    • Secure Traceroute to Detect Faulty or Malicious Routing
    • Jan
    • V.-N. Padmanabhan and D.-R. Simon, "Secure Traceroute to Detect Faulty or Malicious Routing," SIGCOMM Computer Comm. Rev., vol. 33, no. 1, Jan. 2003.
    • (2003) SIGCOMM Computer Comm. Rev , vol.33 , Issue.1
    • Padmanabhan, V.-N.1    Simon, D.-R.2
  • 18
    • 9144231402 scopus 로고    scopus 로고
    • Providing Fault-Tolerant Ad-Hoc Routing Service in Adversarial Environments
    • Y. Xue and K. Nahrstedt, "Providing Fault-Tolerant Ad-Hoc Routing Service in Adversarial Environments," Wireless Personal Comm., vol. 29, nos. 3-4, pp. 367-388, 2004.
    • (2004) Wireless Personal Comm , vol.29 , Issue.3-4 , pp. 367-388
    • Xue, Y.1    Nahrstedt, K.2
  • 20
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
    • Sept
    • Y. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proc. MobiCom, Sept. 2002.
    • (2002) Proc. MobiCom
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3
  • 24
    • 0003424562 scopus 로고    scopus 로고
    • RFC 2018 - TCP Selective Acknowledgement Options
    • PSC, LBNL, Sun Microsystems, Oct
    • M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow, "RFC 2018 - TCP Selective Acknowledgement Options," technical report, PSC, LBNL, Sun Microsystems, Oct. 1996.
    • (1996) technical report
    • Mathis, M.1    Mahdavi, J.2    Floyd, S.3    Romanow, A.4
  • 25
    • 33947637016 scopus 로고    scopus 로고
    • ECC, Future Resiliency and High Security Systems
    • white paper, Certicom, Mar
    • D.B. Johnson, "ECC, Future Resiliency and High Security Systems," white paper, Certicom, www.certicom.com, Mar. 1999.
    • (1999)
    • Johnson, D.B.1
  • 26
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
    • Y. Hu, D.B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Ad Hoc Networks, vol. 1, no. 1, pp. 175-192, 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.1    Johnson, D.B.2    Perrig, A.3
  • 27
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • Nov
    • L. Lamport, "Password Authentication with Insecure Communication," Comm. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
    • (1981) Comm. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 29
    • 0003602325 scopus 로고
    • RFC 1321 - The MD5 Message-Digest Algorithm
    • MIT Laboratory for Computer Science and RSa Data Security, Inc, Apr
    • R.L. Rivest, "RFC 1321 - The MD5 Message-Digest Algorithm," technical report, MIT Laboratory for Computer Science and RSa Data Security, Inc., Apr. 1992.
    • (1992) technical report
    • Rivest, R.L.1
  • 30
    • 4544222189 scopus 로고    scopus 로고
    • RFC 3174 - US Secure Hash Algorithm 1 (SHA1)
    • Motorola and Cisco Systems, Sept
    • D. Eastlake and P. Jones, "RFC 3174 - US Secure Hash Algorithm 1 (SHA1)," technical report, Motorola and Cisco Systems, Sept. 2001.
    • (2001) technical report
    • Eastlake, D.1    Jones, P.2
  • 31
    • 26644463857 scopus 로고    scopus 로고
    • The Network Simulator (ns-2)
    • "The Network Simulator (ns-2)," http://www.isi.edu/nsnam/ns/, 2005.
    • (2005)
  • 32
    • 25644450392 scopus 로고    scopus 로고
    • Perfect Simulation and Stationarity of a Class of Mobility Models
    • Mar
    • J.Y. Le Boudec and M. Vojnović, "Perfect Simulation and Stationarity of a Class of Mobility Models," Proc. INFOCOM, Mar. 2005.
    • (2005) Proc. INFOCOM
    • Le Boudec, J.Y.1    Vojnović, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.