메뉴 건너뛰기




Volumn 8, Issue 6, 2008, Pages 689-704

Struggling against selfishness and black hole attacks in MANETs

Author keywords

Ad hoc networks; Black hole attack; Security; Selfish misbehavior

Indexed keywords

COMPUTER CRIME; FOOD PRESERVATION; ROUTING PROTOCOLS; SOLUTIONS; STARS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 49749126034     PISSN: 15308669     EISSN: None     Source Type: Journal    
DOI: 10.1002/wcm.493     Document Type: Article
Times cited : (45)

References (26)
  • 5
    • 33744828999 scopus 로고    scopus 로고
    • Random feedbacks for selfish nodes detection in mobile ad hoc networks
    • The 5th IEEE InternationalWorkshop on IP Operations and Management, IPOM'05, Barcelona, Spain: Springer-Verlag GmbH, October
    • Djenouri D, Ouali N, Mahmoudi A, Badache N. Random feedbacks for selfish nodes detection in mobile ad hoc networks. In The 5th IEEE InternationalWorkshop on IP Operations and Management, IPOM'05, ser. LNCS, no. 3751. Barcelona, Spain: Springer-Verlag GmbH, October 2005, pp. 68-75.
    • (2005) ser. LNCS , vol.3751 , pp. 68-75
    • Djenouri, D.1    Ouali, N.2    Mahmoudi, A.3    Badache, N.4
  • 6
    • 84892591410 scopus 로고    scopus 로고
    • A survey of security issues in mobile ad hoc and sensor networks
    • Djenouri D, Khalladi L, Badache N. A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys 2005; 7(4): 2-28.
    • (2005) IEEE Communications Surveys , vol.7 , Issue.4 , pp. 2-28
    • Djenouri, D.1    Khalladi, L.2    Badache, N.3
  • 7
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • Hu Y-C, Perrig A. A survey of secure wireless ad hoc routing. IEEE Security and Privacy 2004; 2(3): 28-39.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.-C.1    Perrig, A.2
  • 8
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Imielinski T, Korth H eds, Kluwer Academic: Norwell, MA, USA
    • David B, David A. Dynamic source routing in ad hoc wireless networks. In Mobile Computing (vol. 353), Imielinski T, Korth H (eds). Kluwer Academic: Norwell, MA, USA, 1996; 153-181.
    • (1996) Mobile Computing , vol.353 , pp. 153-181
    • David, B.1    David, A.2
  • 9
    • 33744990823 scopus 로고    scopus 로고
    • A novel approach for selfish nodes detection in manets: Proposal and petri nets based modeling
    • Zagreb, Croatia, June
    • Djenouri D, Badache N. A novel approach for selfish nodes detection in manets: proposal and petri nets based modeling. In The 8th IEEE International Conference on Telecommunications (ConTel'05), Zagreb, Croatia, June 2005, pp. 569-574.
    • (2005) The 8th IEEE International Conference on Telecommunications (ConTel'05) , pp. 569-574
    • Djenouri, D.1    Badache, N.2
  • 11
    • 49749096357 scopus 로고    scopus 로고
    • Davison A. Bayesian Models, Chapter 11 in Manuscript. Springer, 2000.
    • Davison A. Bayesian Models, Chapter 11 in Manuscript. Springer, 2000.
  • 14
    • 10444262976 scopus 로고    scopus 로고
    • Simulation performance evaluation of an energy efficient routing protocol for mobile ad hoc networks
    • American University of Beirut AUB, Lebanon, July
    • Djenouri D, Badache N. Simulation performance evaluation of an energy efficient routing protocol for mobile ad hoc networks. In IEEE International Conference on Pervasive Services (ICPS'04), American University of Beirut (AUB), Lebanon, July 2004.
    • (2004) IEEE International Conference on Pervasive Services (ICPS'04)
    • Djenouri, D.1    Badache, N.2
  • 15
    • 0036980295 scopus 로고    scopus 로고
    • Self-organized network layer security in mobile ad hoc networks
    • Georgia, Atlanta, USA, September
    • Yang H, Meng X, Lu S. Self-organized network layer security in mobile ad hoc networks. In ACM MOBICOM Wireless Security Workshop (WiSe'02), Georgia, Atlanta, USA, September 2002.
    • (2002) ACM MOBICOM Wireless Security Workshop (WiSe'02)
    • Yang, H.1    Meng, X.2    Lu, S.3
  • 16
    • 85113133621 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • Portoroz, Slovenia, September
    • Michiardi P, Molva R. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In The 6th IFIP Communication and Multimedia Security Conference, Portoroz, Slovenia, September 2002.
    • (2002) The 6th IFIP Communication and Multimedia Security Conference
    • Michiardi, P.1    Molva, R.2
  • 19
    • 0004118144 scopus 로고    scopus 로고
    • Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Swiss Federal Institute of Technology, Lausanne, Switzerland
    • Tech. Rep. DSC/2001/001
    • Buttyan L, Hubaux J. Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Swiss Federal Institute of Technology, Lausanne, Switzerland, Tech. Rep. DSC/2001/001, 2001.
    • (2001)
    • Buttyan, L.1    Hubaux, J.2
  • 20
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • Buttyan L, Hubaux J. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 2003; 8(5): 579-592.
    • (2003) ACM/Kluwer Mobile Networks and Applications , vol.8 , Issue.5 , pp. 579-592
    • Buttyan, L.1    Hubaux, J.2
  • 22
    • 33645655242 scopus 로고    scopus 로고
    • Low-cost routing in selfish and rational wireless ad hoc networks
    • Wang W, Li X-Y. Low-cost routing in selfish and rational wireless ad hoc networks. IEEE Transaction on Mobile Computing 2006; 5(5): 596-607.
    • (2006) IEEE Transaction on Mobile Computing , vol.5 , Issue.5 , pp. 596-607
    • Wang, W.1    Li, X.-Y.2
  • 23
    • 32144433522 scopus 로고    scopus 로고
    • On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: An integrated approach using game theoretical and cryptographic techniques
    • ACM Press
    • Zhong S, Li LE, Liu YG, Yang YR. On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques. In The 11th annual international conference on Mobile computing and networking (MobiCom'05). ACM Press, 2005, pp. 117-131.
    • (2005) The 11th annual international conference on Mobile computing and networking (MobiCom'05) , pp. 117-131
    • Zhong, S.1    Li, L.E.2    Liu, Y.G.3    Yang, Y.R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.