메뉴 건너뛰기




Volumn 8, Issue 4, 2009, Pages 1888-1898

A Trustworthiness-based QoS routing protocol for wireless ad hoc networks

Author keywords

Mobile ad hoc network; QoS; Routing protocol; Security

Indexed keywords

DYNAMIC TOPOLOGIES; MESSAGE EXCHANGING; NETWORK TRAFFIC; ON-DEMAND; QOS; QOS ROUTING; QOS ROUTING PROTOCOL; ROUTE DISCOVERY; ROUTING CONTROL; ROUTING METRICS; SECURE ROUTING PROTOCOLS; SECURITY; SECURITY AND PERFORMANCE; SIMULATION RESULT; WIRELESS LINK;

EID: 65949087881     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2009.080161     Document Type: Article
Times cited : (45)

References (28)
  • 1
    • 37049001818 scopus 로고    scopus 로고
    • Scalable and deterministic key agreement for large scale networks
    • DOI 10.1109/TWC.2007.06088
    • Y. Zhou and Y. Fang "Scalable and deterministic key agreement for large scale networks" IEEE Trans. Wireless Commun., vol. 6, no. 12, pp. 4366-4373, Dec. 2007. (Pubitemid 350249473)
    • (2007) IEEE Transactions on Wireless Communications , vol.6 , Issue.12 , pp. 4366-4373
    • Zhou, Y.1    Fang, Y.2
  • 2
    • 9544227378 scopus 로고    scopus 로고
    • An efficient quality of service routing algorithm for delay-sensitive applications
    • and
    • W. Liu W. Lou and Y. Fang "An efficient quality of service routing algorithm for delay-sensitive applications" Computer Networks, vol. 47, no. 11, pp. 6187-104, 2005.
    • (2005) Computer Networks , vol.47 , Issue.11 , pp. 6187-104
    • Liu, W.1    Lou, W.2    Fang, Y.3
  • 3
    • 37549009866 scopus 로고    scopus 로고
    • Distributed algorithms for secure multipath routing in attack-resistant networks
    • Dec
    • P. P. C. Lee V. Misra D. Rubenstein "Distributed algorithms for secure multipath routing in attack-resistant networks" IEEE/ACM Trans. Networking, vol. 15, no. 6, pp. 1490-1501, Dec. 2007.
    • (2007) IEEE/ACM Trans. Networking , vol.15 , Issue.6 , pp. 1490-1501
    • Lee, P.P.C.1    Misra, V.2    Rubenstein, D.3
  • 4
    • 84868943211 scopus 로고    scopus 로고
    • Routing with Byzantine robustness
    • [Online]. Available:, pdf, Sept
    • R. Perlman "Routing with Byzantine robustness" Report no: TR-2005-146 [Online]. Available: http://research.sun.com/techrep/2005/smli-tr- 2005-146.pdf, Sept. 2005.
    • (2005) Report no: TR-2005-146
    • Perlman, R.1
  • 5
    • 0004024262 scopus 로고    scopus 로고
    • Ad hoc on-demand distance vector routing
    • and, Addison-Wesley Chapt 5
    • C. E. Perkins and E. M. Royer "Ad hoc on-demand distance vector routing" Ad Hoc Networking Chapt. 5. Addison-Wesley, 2001.
    • (2001) Ad Hoc Networking
    • Perkins, C.E.1    Royer, E.M.2
  • 6
    • 0035249889 scopus 로고    scopus 로고
    • Performance comparison of two on-demand routing protocols for ad hoc networks
    • and, Feb
    • C. E. Perkins E. M. Royers and S. R. Das "Performance comparison of two on-demand routing protocols for ad hoc networks "IEEE Personal Commun., vol. 8, no. 1, p. 16-28, Feb. 2001.
    • (2001) IEEE Personal Commun , vol.8 , Issue.1 , pp. 16-28
    • Perkins, C.E.1    Royers, E.M.2    Das, S.R.3
  • 14
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • and, Jan./Mar
    • S. Capkun L. Buttyan and J. Hubaux "Self-organized public-key management for mobile ad hoc networks" IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 1-13, Jan./Mar. 2003.
    • (2003) IEEE Trans. Mobile Computing , vol.2 , Issue.1 , pp. 1-13
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.3
  • 15
    • 37549056154 scopus 로고    scopus 로고
    • Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach
    • and, Dec
    • J. Salido L. Lazos and R. Poovendran "Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach" IEEE/ACM Trans. Networking, vol. 15, no. 6, pp. 1527-1540, Dec. 2007.
    • (2007) IEEE/ACM Trans. Networking , vol.15 , Issue.6 , pp. 1527-1540
    • Salido, J.1    Lazos, L.2    Poovendran, R.3
  • 16
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: attacks and countermeasures
    • and
    • C. Karlof and D. Wagner "Secure routing in wireless sensor networks: attacks and countermeasures" Ad Hoc Networks, pp. 293-315, vol. 1, 2003.
    • (2003) Ad Hoc Networks , vol.1 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 17
    • 18144393441 scopus 로고    scopus 로고
    • Using feedback in collaborative reinforcement learning to adaptively optimize MANET routing
    • and, May
    • J. Dowling E. Curran R. Cunningham and V. Cahil "Using feedback in collaborative reinforcement learning to adaptively optimize MANET routing" IEEE Trans. SMC, Part A: Systems Humans, pp. 360-372, vol. 35, no. 3, May 2005.
    • (2005) IEEE Trans. SMC, Part A: Systems Humans , vol.35 , Issue.3 , pp. 360-372
    • Dowling, J.1    Curran, E.2    Cunningham, R.3    Cahil, V.4
  • 20
    • 21644472211 scopus 로고    scopus 로고
    • ns-2 [Online]. Available
    • The Network Simulator ns-2 [Online]. Available: http://www.isi.edu/nsnam/ ns/.
    • The Network Simulator
  • 22
    • 34547505939 scopus 로고    scopus 로고
    • Ad hoc network security: a review
    • and, Aug
    • C. Zhang M. C. Zhou and M. Yu "Ad hoc network security: a review" Int. J. Commun. Syst., vol. 20, no. 8, pp. 909-925, Aug. 2007.
    • (2007) Int. J. Commun. Syst. , vol.20 , Issue.8 , pp. 909-925
    • Zhang, C.1    Zhou, M.C.2    Yu, M.3
  • 24
    • 41849085232 scopus 로고    scopus 로고
    • A distributed radio channel allocation scheme for WLANs with multiple data rates
    • and, Mar
    • M. Yu A. Malvankar and W. Su "A distributed radio channel allocation scheme for WLANs with multiple data rates" IEEE Trans. Commun., vol. 56, no. 3, Mar. 2008.
    • (2008) IEEE Trans. Commun. , vol.56 , Issue.3
    • Yu, M.1    Malvankar, A.2    Su, W.3
  • 25
    • 1842478856 scopus 로고    scopus 로고
    • Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks
    • and, Mar
    • B. Krishnamachari and S. Iyengar "Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks" IEEE Trans. Computers, vol. 53, no. 3, pp. 241-250, Mar. 2004.
    • (2004) IEEE Trans. Computers , vol.53 , Issue.3 , pp. 241-250
    • Krishnamachari, B.1    Iyengar, S.2
  • 27
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • and
    • D. Boneh and M. Franklin "Identity based encryption from the Weil pairing" SIAM J. Computing, vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM J. Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 28
    • 15244347963 scopus 로고    scopus 로고
    • A compilation framework for power and energy management on mobile computers
    • and, DCS-TR-446, Rutgers University, June
    • U. Kremer J. Hicks and J. M. Rehg "A compilation framework for power and energy management on mobile computers" Dept. CS Technical Report, DCS-TR-446, Rutgers University, June 2001.
    • (2001) Dept. CS Technical Report
    • Kremer, U.1    Hicks, J.2    Rehg, J.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.