메뉴 건너뛰기




Volumn 31, Issue 9, 2008, Pages 1796-1802

Identification of malicious nodes in an AODV pure ad hoc network through guard nodes

Author keywords

Ad hoc network; AODV; Guard node; Security; Trust value

Indexed keywords

COMPUTER SIMULATION; NETWORK PROTOCOLS; NETWORK SECURITY;

EID: 43449107967     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2007.11.012     Document Type: Article
Times cited : (35)

References (21)
  • 1
    • 43449114441 scopus 로고    scopus 로고
    • Janne Lundberg, Routing security in ad hoc networks, Technical report, Helsinki University of Technology, Telecommunications Software and Multimedia Laboratory, Available from: , 2000.
    • Janne Lundberg, Routing security in ad hoc networks, Technical report, Helsinki University of Technology, Telecommunications Software and Multimedia Laboratory, Available from: , 2000.
  • 2
    • 43449138451 scopus 로고    scopus 로고
    • V. Karpijoki, Security in ad hoc networks, Technical report, Helsinki University of Technology, Available from: , 2000.
    • V. Karpijoki, Security in ad hoc networks, Technical report, Helsinki University of Technology, Available from: , 2000.
  • 4
    • 85177499703 scopus 로고    scopus 로고
    • Sergio Marti, Thomas J. Giuli, Kevin Lai, Mary Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, MOBICOM, Boston, Massachusetts, August 2000.
    • Sergio Marti, Thomas J. Giuli, Kevin Lai, Mary Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, MOBICOM, Boston, Massachusetts, August 2000.
  • 5
    • 43449134050 scopus 로고    scopus 로고
    • Seung Yi, Prasad Naldurg, Robin Kravets, Security-aware ad hoc routing for wireless networks, Technical Report UIUCDCS-R-2001-2241, UIUC, August 2001.
    • Seung Yi, Prasad Naldurg, Robin Kravets, Security-aware ad hoc routing for wireless networks, Technical Report UIUCDCS-R-2001-2241, UIUC, August 2001.
  • 6
    • 43449100900 scopus 로고    scopus 로고
    • Manel Zapata Guerrero, Nadarajah Asokan, Securing ad hoc routing protocols, in: ACM Workshop on Wireless Security (WiSe) in conjunction with ACM MobiCom, Atlanta, Georgia, September 2002.
    • Manel Zapata Guerrero, Nadarajah Asokan, Securing ad hoc routing protocols, in: ACM Workshop on Wireless Security (WiSe) in conjunction with ACM MobiCom, Atlanta, Georgia, September 2002.
  • 7
    • 43449129423 scopus 로고    scopus 로고
    • Aaron Staple, Mukund Sundarajan, Analysis of SuperSEAD: A Secure Ad Hoc Routing Protocol, Technical report, Stanford University, May 2004.
    • Aaron Staple, Mukund Sundarajan, Analysis of SuperSEAD: A Secure Ad Hoc Routing Protocol, Technical report, Stanford University, May 2004.
  • 8
    • 43449139673 scopus 로고    scopus 로고
    • Rajiv K. Nekkanti, Chung-wei Lee, Trust Based Adaptive On Demand Ad Hoc Routing Protocol, ACMSE '04, Huntsville, Alabama, USA, April 2004.
    • Rajiv K. Nekkanti, Chung-wei Lee, Trust Based Adaptive On Demand Ad Hoc Routing Protocol, ACMSE '04, Huntsville, Alabama, USA, April 2004.
  • 9
    • 43449125572 scopus 로고    scopus 로고
    • Simson Garfinkel, PGP: Pretty Good Privacy, OReilly Associates, January 1995.
    • Simson Garfinkel, PGP: Pretty Good Privacy, OReilly Associates, January 1995.
  • 10
    • 43449115655 scopus 로고    scopus 로고
    • Asad Amir Pirzada, Chris, McDonald, Establishing trust in pure ad-hoc networks, in: Proceedings 27th Australasian Computer Science Conference (ACSC'04), Dunedin, New Zealand, 26(1), January 2004, pp. 47-54.
    • Asad Amir Pirzada, Chris, McDonald, Establishing trust in pure ad-hoc networks, in: Proceedings 27th Australasian Computer Science Conference (ACSC'04), Dunedin, New Zealand, 26(1), January 2004, pp. 47-54.
  • 11
    • 43449088195 scopus 로고    scopus 로고
    • Frank Stajano, Ross Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks. Insecurity protocols, in: 7th International Workshop Proceedings, Lecture Notes in Computer Science, Springer-Verlag, 1999.
    • Frank Stajano, Ross Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks. Insecurity protocols, in: 7th International Workshop Proceedings, Lecture Notes in Computer Science, Springer-Verlag, 1999.
  • 12
    • 43449119174 scopus 로고    scopus 로고
    • Panagiotis Papadimitrtos, Zygmunt J. Haas, Secure routing for mobile ad hoc networks, in: Proceedings of SCS communication Networks and Distributed Systems modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 2002.
    • Panagiotis Papadimitrtos, Zygmunt J. Haas, Secure routing for mobile ad hoc networks, in: Proceedings of SCS communication Networks and Distributed Systems modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 2002.
  • 13
    • 21144452079 scopus 로고    scopus 로고
    • Niki Pissinou, Tirtankar Ghosh, Kia Makki, Collaborative trust-based secure routing in multihop ad hoc networks, in: Proceedings of Networking '04, Lecture Notes in Computer Science, vol. 3042, Springer-Verlag, Athens, Greece, May 2004, pp. 1446-1451.
    • Niki Pissinou, Tirtankar Ghosh, Kia Makki, Collaborative trust-based secure routing in multihop ad hoc networks, in: Proceedings of Networking '04, Lecture Notes in Computer Science, vol. 3042, Springer-Verlag, Athens, Greece, May 2004, pp. 1446-1451.
  • 14
    • 20544474194 scopus 로고    scopus 로고
    • Niki Pissinou, Tirtankar Ghosh, Kia Makki, Collaborative trust-based secure routing against colluding malicious nodes in multihop ad hoc networks, in: Proceedings of the 29th Annual IEEE international Conference on Local Computer Networks (LCN'04), Tempa, USA, November 2004, pp. 742-1303/04.
    • Niki Pissinou, Tirtankar Ghosh, Kia Makki, Collaborative trust-based secure routing against colluding malicious nodes in multihop ad hoc networks, in: Proceedings of the 29th Annual IEEE international Conference on Local Computer Networks (LCN'04), Tempa, USA, November 2004, pp. 742-1303/04.
  • 15
    • 11244256574 scopus 로고    scopus 로고
    • Edith C.H. Nagai, Michael R. Lyu, Ronald T. Chin, An authentication service against dishonest users in mobile ad hoc networks, in: Proceedings of IEEE Aerospace Conference, Big Sky, Montana, USA, March 2004.
    • Edith C.H. Nagai, Michael R. Lyu, Ronald T. Chin, An authentication service against dishonest users in mobile ad hoc networks, in: Proceedings of IEEE Aerospace Conference, Big Sky, Montana, USA, March 2004.
  • 16
    • 43449105302 scopus 로고    scopus 로고
    • A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks, PhD thesis, Department of Computer Science and Engineering, The Chinese University of Hong Kong, Available from: www.cse.cuhk.edu.hk/lyu/student/phd/gigi/term4/.
    • A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks, PhD thesis, Department of Computer Science and Engineering, The Chinese University of Hong Kong, Available from: www.cse.cuhk.edu.hk/lyu/student/phd/gigi/term4/.
  • 17
    • 85150403578 scopus 로고    scopus 로고
    • A. Josang, Logic for uncertain probabilities, in: International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9 (3) (2001) 279-311.
    • A. Josang, Logic for uncertain probabilities, in: International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9 (3) (2001) 279-311.
  • 18
    • 43449117742 scopus 로고    scopus 로고
    • Seungjin Park, M. Al-Shurman, Seong-Moo Yoo, Black Hole Attack in Mobile Ad hoc Network, ACMSE'04, Huntsville, AL, USA, April 2004.
    • Seungjin Park, M. Al-Shurman, Seong-Moo Yoo, Black Hole Attack in Mobile Ad hoc Network, ACMSE'04, Huntsville, AL, USA, April 2004.
  • 19
    • 84944714533 scopus 로고    scopus 로고
    • Animesh Patcha, Amitab Mishra, Collaborative security architecture for black hole attack prevention in mobile ad hoc networks, in: Proceedings of the 2003 IEEE Radio and Wireless Conference, Boston, MA, USA, July 2003, pp. 75-78.
    • Animesh Patcha, Amitab Mishra, Collaborative security architecture for black hole attack prevention in mobile ad hoc networks, in: Proceedings of the 2003 IEEE Radio and Wireless Conference, Boston, MA, USA, July 2003, pp. 75-78.
  • 20
    • 26844569805 scopus 로고    scopus 로고
    • Slavisa Sarafijanovic, Jean-Yvess Le Boudec, An artificial immune system approach with secondary response for misbehaving detection in mobile ad hoc networks, in: IEEE Transaction on Neural Networks, vol. 16, No. 5, September 2005.
    • Slavisa Sarafijanovic, Jean-Yvess Le Boudec, An artificial immune system approach with secondary response for misbehaving detection in mobile ad hoc networks, in: IEEE Transaction on Neural Networks, vol. 16, No. 5, September 2005.
  • 21
    • 43449131173 scopus 로고    scopus 로고
    • Available from: www.opnet.com.
    • Available from: www.opnet.com.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.