메뉴 건너뛰기




Volumn 175, Issue , 2005, Pages 31-45

Local management of credits and debits in mobile ad hoc networks

Author keywords

Mobile ad hoc networks (MANETs); Selfishness

Indexed keywords

INFORMATION TECHNOLOGY;

EID: 46749125764     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-24486-7_3     Document Type: Conference Paper
Times cited : (2)

References (18)
  • 1
    • 33751044073 scopus 로고    scopus 로고
    • Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
    • The Internet Society
    • Balfanz, D., Smetters, D., Stewart, P., and Wong, H. C. (2002). Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In Proc. of NDSS'02. The Internet Society.
    • (2002) Proc. of NDSS'02
    • Balfanz, D.1    Smetters, D.2    Stewart, P.3    Wong, H.C.4
  • 2
    • 2442597363 scopus 로고    scopus 로고
    • Performance Analysis of the CONFIDANT Protocol. Cooperation Of Nodes-Fairness In Dynamic Ad-hoc Networks
    • In
    • Buchegger, S. and Boudec, J. L. (2002). Performance Analysis of the CONFIDANT Protocol. Cooperation Of Nodes-Fairness In Dynamic Ad-hoc Networks. In Proc. of ACM Mobi-Hoc'02.
    • (2002) Proc. of ACM Mobi-Hoc'02.
    • Buchegger, S.1    Boudec, J.L.2
  • 6
    • 0001341422 scopus 로고    scopus 로고
    • DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks
    • (Addison-Wesley)
    • Johnson, D., Maltz, D., and Broch, J. (Addison-Wesley, 2001). DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. Ad Hoc Networking, chapter 5, pages 139-172.
    • (2001) Ad Hoc Networking, chapter 5 , pp. 139-172
    • Johnson, D.1    Maltz, D.2    Broch, J.3
  • 9
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks
    • In, ACM
    • Marti, S., Giuli, T., Lai, K., and Baker, M. (2000). Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In Proc. of MobiCom'OO, pages 255-265. ACM.
    • (2000) Proc. of MobiCom'OO , pp. 255-265
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 10
    • 5044238739 scopus 로고    scopus 로고
    • Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks
    • In
    • Michiardi, P. and Molva, R. (2002a). Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In Proc. of CMS'02.
    • (2002) Proc. of CMS'02.
    • Michiardi, P.1    Molva, R.2
  • 11
    • 3042542420 scopus 로고    scopus 로고
    • Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks
    • In
    • Michiardi, P. and Molva, R. (2002b). Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks. In Proc. of European Wireless'02.
    • (2002) Proc. of European Wireless'02.
    • Michiardi, P.1    Molva, R.2
  • 12
    • 4444276583 scopus 로고    scopus 로고
    • A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile Ad hoc Networks
    • In, L. M. S. C. (1999). Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. In IEEE Standard 802.11, 1999 Edition
    • Michiardi, P. and Molva, R. (2003). A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile Ad hoc Networks. In Proc. ofwi0pt'03. of the IEEE Computer Society, L. M. S. C. (1999). Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. In IEEE Standard 802.11, 1999 Edition.
    • (2003) Proc. ofwi0pt'03. of the IEEE Computer Society
    • Michiardi, P.1    Molva, R.2
  • 14
    • 0242527340 scopus 로고    scopus 로고
    • A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks
    • Salem, N. B., Buttyan, L., Hubaux, J., and Jakobsson, M. (2003). A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks. In Proc. of ACM Mobi-Hoc '03.
    • (2003) Proc. of ACM Mobi-Hoc '03.
    • Salem, N.B.1    Buttyan, L.2    Hubaux, J.3    Jakobsson, M.4
  • 15
    • 84947251443 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks
    • In, volume LNCS 1796
    • Stajano, F. and Anderson, R. (1999). The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks. In Proc. of 7th Security Protocols Workshop, volume LNCS 1796, pages 172-194.
    • (1999) Proc. of 7th Security Protocols Workshop , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 16
    • 11244285854 scopus 로고    scopus 로고
    • Modelling Cooperation in Mobile Ad-hoc Networks: A Formal Description of Selfishness
    • In
    • Urpi, A., Bonuccelli, M., and Giordano, S. (2003). Modelling Cooperation in Mobile Ad-hoc Networks: a Formal Description of Selfishness. In Proc. of wiOpt'03.
    • (2003) Proc. of wiOpt'03.
    • Urpi, A.1    Bonuccelli, M.2    Giordano, S.3
  • 17
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks
    • In
    • Zhong, S., Chen, J., and Yang, Y. (2003). Sprite: a Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. In Proc. of IEEE Infocom'03.
    • (2003) Proc. of IEEE Infocom'03.
    • Zhong, S.1    Chen, J.2    Yang, Y.3
  • 18
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc Networks
    • Zhou, L. and Haas, Z. (1999). Securing Ad Hoc Networks. IEEE Network, 13(6):24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.