메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 119-123

LARS - A locally aware reputation system for mobile ad hoc networks

Author keywords

MANET; Reputation systems; Selfishness; Trust; Virtual currency schemes

Indexed keywords

LOCALLY AWARE REPUTATION SYSTEM (LARS); MOBILE AD HOC NETWORKS (MANET); NODES; VIRTUAL CURRENCY SCHEMES;

EID: 34248353027     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1185448.1185475     Document Type: Conference Paper
Times cited : (53)

References (21)
  • 5
    • 85177240798 scopus 로고    scopus 로고
    • Y-C Hu, A. Perrig, D. B. Johnson, Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks, Proc. MOBICOM 2002.
    • Y-C Hu, A. Perrig, D. B. Johnson, Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks, Proc. MOBICOM 2002.
  • 7
    • 84961572484 scopus 로고    scopus 로고
    • Y-C. Hu, D. B. Johnson, and A. Perrig, SEAD: Secure and efficient distance vector routing for mobile wireless ad hoc networks, 4th IEEE Workshop on Mobile Computing Systems and Applications, 2002.
    • Y-C. Hu, D. B. Johnson, and A. Perrig, SEAD: Secure and efficient distance vector routing for mobile wireless ad hoc networks, 4th IEEE Workshop on Mobile Computing Systems and Applications, 2002.
  • 8
    • 25844488399 scopus 로고    scopus 로고
    • Enforced Service Availability in Mobile Ad-Hoc WANs
    • L. Buttyan and J-P. Hubaux, Enforced Service Availability in Mobile Ad-Hoc WANs, Proc. MobiHoc 2000
    • (2000) Proc. MobiHoc
    • Buttyan, L.1    Hubaux, J.-P.2
  • 9
    • 1542326337 scopus 로고    scopus 로고
    • A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
    • N. B. Salem, L. Buttyan, J-P. Hubaux, M. Jakobsson, A charging and rewarding scheme for packet forwarding in multi-hop cellular networks, Proc. MobiHoc 2003.
    • (2003) Proc. MobiHoc
    • Salem, N.B.1    Buttyan, L.2    Hubaux, J.-P.3    Jakobsson, M.4
  • 10
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, Cheat-proof, Credit-based System for Mobile Ad hoc Networks
    • S. Zhong, J. Chen, and Y. R. Yang, Sprite: A simple, Cheat-proof, Credit-based System for Mobile Ad hoc Networks, Proc. IEEE Infocom '03.
    • Proc. IEEE Infocom '03
    • Zhong, S.1    Chen, J.2    Yang, Y.R.3
  • 11
    • 2642586050 scopus 로고    scopus 로고
    • Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks
    • S. Buchegger and J-Y. Le Boudec, Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks, Proc. MobiHoc 2002.
    • (2002) Proc. MobiHoc
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 13
    • 5044238739 scopus 로고    scopus 로고
    • Core: A Collaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks, IFIP-Communicatin and Multimedia
    • P. Michiardi, R. Molva, Core: A Collaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks, IFIP-Communicatin and Multimedia, Security Conference 2002.
    • (2002) Security Conference
    • Michiardi, P.1    Molva, R.2
  • 14
    • 4544308674 scopus 로고    scopus 로고
    • Observation-based Cooperation Enforcement in Ad Hoc Networks
    • Technical report, Stanford University, NI/0307012
    • S. Bansal and M. Baker, Observation-based Cooperation Enforcement in Ad Hoc Networks, Technical report, Stanford University, NI/0307012, 2003.
    • (2003)
    • Bansal, S.1    Baker, M.2
  • 15
    • 80052174596 scopus 로고    scopus 로고
    • The effect of rumor spreading in reputation systems for mobile ad-hoc networks
    • S. Buchegger and J-Y. Le Boudec, The effect of rumor spreading in reputation systems for mobile ad-hoc networks. Proc. WiOpt '03.
    • Proc. WiOpt '03
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 16
    • 34547587401 scopus 로고    scopus 로고
    • Reputation methods for routing security for mobile ad hoc networks
    • P. Yau and C. J. Mitchell, Reputation methods for routing security for mobile ad hoc networks, Proc. SympoTIC '03.
    • Proc. SympoTIC '03
    • Yau, P.1    Mitchell, C.J.2
  • 17
    • 6344271642 scopus 로고    scopus 로고
    • Security vulnerabilities in ad hoc networks
    • Communication Theory and Applications
    • P. Yau and C. J. Mitchell, Security vulnerabilities in ad hoc networks, 7th Intern. Symp. Communication Theory and Applications, 2003.
    • (2003) 7th Intern. Symp
    • Yau, P.1    Mitchell, C.J.2
  • 19
    • 34248332339 scopus 로고    scopus 로고
    • Y. Wang, V. C. Giruka, M. Singhal. A Fair Distributed Solution for Selfish Nodes Problem in Wireless Ad Hoc Networks. ADHOC-NOW 2004.
    • Y. Wang, V. C. Giruka, M. Singhal. A Fair Distributed Solution for Selfish Nodes Problem in Wireless Ad Hoc Networks. ADHOC-NOW 2004.
  • 20
    • 34248389908 scopus 로고    scopus 로고
    • http://www.isi.edu/nsnam/ns/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.