메뉴 건너뛰기




Volumn , Issue , 2007, Pages 102-109

Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols

Author keywords

Cryptographic security; Misbehavior detection; Mobile ad hoc networks; Self organization; Swarm intelligence

Indexed keywords

AD HOC NETWORKS; EMBEDDED SYSTEMS; GLOBAL OPTIMIZATION; PUBLIC KEY CRYPTOGRAPHY; ROUTING PROTOCOLS;

EID: 34548068359     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1276958.1276973     Document Type: Conference Paper
Times cited : (10)

References (17)
  • 2
    • 0035015898 scopus 로고    scopus 로고
    • Investigating the energy consumption of a wireless network interface in an ad hoc networking environment
    • Laura M. Feeney and Martin Nilsson. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In Proceedings of IEEE INFOCOM, 2001.
    • (2001) Proceedings of IEEE INFOCOM
    • Feeney, L.M.1    Nilsson, M.2
  • 4
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1-2):21-38, 2005.
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3
  • 5
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Imielinski and Korth, editors, Kluwer Academic Publishers
    • David B Johnson and David A Maltz. Dynamic source routing in ad hoc wireless networks. In Imielinski and Korth, editors, Mobile Computing, pages 153-181. Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 6
    • 0033357103 scopus 로고    scopus 로고
    • Z.J. Haas L. Zhou. Securing ad hoc networks. IEEE Network Magazine, 13(6), Dec 1999.
    • Z.J. Haas L. Zhou. Securing ad hoc networks. IEEE Network Magazine, 13(6), Dec 1999.
  • 10
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad-hoc mobile wireless networks
    • E. Royer and C. Toh. A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications, 1999.
    • (1999) IEEE Personal Communications
    • Royer, E.1    Toh, C.2
  • 11
    • 26844569805 scopus 로고    scopus 로고
    • S. Sarafljanovic and J.Y. Le Boudec. An artificial immune system approach with secondary response for misbehavior detection in mobile ad-hoc networks. IEEE Transactions on Neural Networks, 16(5), Sep 2005.
    • S. Sarafljanovic and J.Y. Le Boudec. An artificial immune system approach with secondary response for misbehavior detection in mobile ad-hoc networks. IEEE Transactions on Neural Networks, 16(5), Sep 2005.
  • 12
    • 34548081082 scopus 로고    scopus 로고
    • W. Stallings. Cryptography and Network Security -Principles and Practices. Pearson Educ., Inc., 2003.
    • W. Stallings. Cryptography and Network Security -Principles and Practices. Pearson Educ., Inc., 2003.
  • 14
    • 32444432940 scopus 로고    scopus 로고
    • Beeadhoc: An energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior
    • H.F. Wedde, M. Farooq, T. Pannenbaecker, B. Vogel, C. Mueller, J. Meth, and R. Jeruschkat. Beeadhoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. In GECCO, pages 153-160, 2005.
    • (2005) GECCO , pp. 153-160
    • Wedde, H.F.1    Farooq, M.2    Pannenbaecker, T.3    Vogel, B.4    Mueller, C.5    Meth, J.6    Jeruschkat, R.7
  • 15
    • 33750241323 scopus 로고    scopus 로고
    • Beehiveais: A simple, efficient, scalable and secure routing framework inspired by artificial immune systems
    • H.F. Wedde, C. Timm, and M. Farooq. Beehiveais: A simple, efficient, scalable and secure routing framework inspired by artificial immune systems. In PPSN, pages 623-632, 2006.
    • (2006) PPSN , pp. 623-632
    • Wedde, H.F.1    Timm, C.2    Farooq, M.3
  • 16
    • 33745781835 scopus 로고    scopus 로고
    • Beehiveguard: A step towards secure nature inspired routing algorithms
    • H.F. Wedde, C. Timm, and M. Farooq. Beehiveguard: A step towards secure nature inspired routing algorithms. In EvoWorkshops, pages 243-254, 2006.
    • (2006) EvoWorkshops , pp. 243-254
    • Wedde, H.F.1    Timm, C.2    Farooq, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.