메뉴 건너뛰기




Volumn , Issue , 2008, Pages 156-161

Markov chain-based trust model for analyzing trust value in distributed multicasting mobile Ad hoc networks

Author keywords

Markov chain analysis; Multicast MANET; Secure authentication; Trust value

Indexed keywords

AD HOC NETWORKS; AUTHENTICATION; INFORMATION MANAGEMENT; MARKOV PROCESSES; MINING; MOBILE TELECOMMUNICATION SYSTEMS; MULTICASTING; TELECOMMUNICATION NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 67049097590     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/APSCC.2008.27     Document Type: Conference Paper
Times cited : (21)

References (33)
  • 2
    • 4143104126 scopus 로고    scopus 로고
    • Sensor networks: An overview
    • DOI 10.1109/MP.2003.1197877
    • M. Tubaishat and S. Madria, "Sensor Networks: An Overview," IEEE Potentials, Vol.22 pp.20-23, Apr. 2003. (Pubitemid 44208080)
    • (2003) IEEE Potentials , vol.22 , Issue.2 , pp. 20-23
    • Tubaishat, M.1    Madria, S.2
  • 3
    • 0038675868 scopus 로고    scopus 로고
    • A survey of mobility models for ad hoc network research
    • DOI 10.1002/wcm.72
    • T. Camp, J. Boleng and V. Davies, "A Survey of Mobility Models for Ad Hoc Network Research," Wireless Communications & Mobile Computing,Vol.2, No. 5, pp.483-502, Aug. 2002. (Pubitemid 135713186)
    • (2002) Wireless Communications and Mobile Computing , vol.2 , Issue.5 , pp. 483-502
    • Camp, T.1    Boleng, J.2    Davies, V.3
  • 4
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • H. Yang, H. Luo, F. Ye, S. Lu and L. Zhang; "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Communications, Vol.11, Issue 1, pp.38-47, Feb. 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 6
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • A.Mishra, K. Nadkarni and A. Patcha, "Intrusion Detection in Wireless Ad Hoc Networks," IEEE Wireless Communications, Vol.11, Issue 1, pp.48-60, Feb. 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 7
    • 33744915525 scopus 로고    scopus 로고
    • Trust establishment in pure ad-hoc networks
    • DOI 10.1007/s11277-006-1574-5
    • A.A. Pirzada and C. McDonald, "Trust Establishment in Pure Ad-hoc Networks," Wireless Personal Communications, Vol.37, pp.139-168, Apr. 2006. (Pubitemid 43847195)
    • (2006) Wireless Personal Communications , vol.37 , Issue.1-2 , pp. 139-168
    • Pirzada, A.A.1    McDonald, C.2
  • 9
    • 34247350837 scopus 로고    scopus 로고
    • Assessing vulnerabilities: Modeling ad-hoc rushing attack in a negligibility-based security framework
    • J. Kong, X. Hong and M. Gerla, "Assessing Vulnerabilities: Modeling Ad-hoc Rushing attack in A Negligibility-based Security Framework," ACM Workshop on Wireless Security, pp.55-64, Sep. 2006.
    • (2006) ACM Workshop on Wireless Security , pp. 55-64
    • Kong, J.1    Hong, X.2    Gerla, M.3
  • 10
    • 0842289248 scopus 로고    scopus 로고
    • Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks
    • R. Mahalingam and N. Menon, "Pre-loaded Key Based Multicast and Broadcast Authentication in Mobile Ad-hoc Networks," IEEE Global Telecommunications Conference 2003, Vol.3, pp. 1405-1409, Dec. 2003.
    • (2003) IEEE Global Telecommunications Conference 2003 , vol.3 , pp. 1405-1409
    • Mahalingam, R.1    Menon, N.2
  • 11
    • 21644478900 scopus 로고    scopus 로고
    • Secure multicast model for ad-hoc military networks
    • Proceedings - 2004 12th IEEE International Conference on Networks, ICON 2004 - Unity in Diversity
    • M. Choudhary, P. Sharma and D. Sanghi, "Secure Multicast Model for Ad-hoc Military Networks," The 12th IEEE International Conference on Networks, Vol.2, pp. 683-688, Nov. 2004. (Pubitemid 40926561)
    • (2004) Proceedings - IEEE International Conference on Networks, ICON , vol.2 , pp. 683-688
    • Choudhary, M.1    Sharma, P.2    Sanghi, D.3
  • 12
    • 66149127961 scopus 로고    scopus 로고
    • PKIX Working Group, draft-ietf-pkix-rfc3280bis-08.txt
    • PKIX Working Group, "Internet X.509 Public Key Infrastructure," draft-ietf-pkix-rfc3280bis-08.txt, 2007.
    • (2007) Internet X.509 Public Key Infrastructure
  • 13
    • 0003899818 scopus 로고    scopus 로고
    • The kerberos network authentication service (version 5)
    • C. Neuman, T. Yu, S. Hartman and K. Raeburn, "The Kerberos Network Authentication Service (version 5)," RFC 4120, July 2005.
    • (2005) RFC 4120
    • Neuman, C.1    Yu, T.2    Hartman, S.3    Raeburn, K.4
  • 16
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • A. Jsang, R. Ismail and C. Boyd, "A Survey of Trust and Reputation Systems for Online Service Provision," Decision Support Systems, Vol.43, No.2, pp. 618-644, Mar. 2005.
    • (2005) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Jsang, A.1    Ismail, R.2    Boyd, C.3
  • 17
    • 34547421426 scopus 로고    scopus 로고
    • The index poisoning attack in P2P file sharing systems
    • DOI 10.1109/INFOCOM.2006.232, Proceedings - INFOCOM 2006: 25th IEEE International Conference on Computer Communications
    • J. Liang, N. Naoumov and K.W. Ross, "The Index Poisoning Attack in P2P File-Sharing Systems," IEEE Infocom, pp.1-12, Apr. 2006. (Pubitemid 351240418)
    • (2006) Proceedings - IEEE INFOCOM , pp. 4146885
    • Liang, J.1    Naoumov, N.2    Ross, K.W.3
  • 20
    • 85113133621 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • P. Michiardi and R. Molva, "Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," IFIP TC6/TC11 6th CCMS'02, pp.107-121, Sep. 2002.
    • (2002) IFIP TC6/TC11 6th CCMS'02 , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 22
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • DOI 10.1109/JSAC.2005.861389
    • Y. Sun, W. Yu, Z. Han and K.J. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks," IEEE Journal on Selected Areas in Communications, Vol.24, pp.305-317, Feb. 2006. (Pubitemid 43269751)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 305-315
    • Sun, Y.L.1    Yu, W.2    Han, Z.3
  • 23
    • 0001951820 scopus 로고
    • Trust: Making and breaking cooperative relations
    • chapter 13
    • D. Gambetta, "Trust: Making and Breaking Cooperative Relations," Basil Blackwell, chapter 13, pp.213-237, 1988.
    • (1988) Basil Blackwell , pp. 213-237
    • Gambetta, D.1
  • 26
    • 33751041485 scopus 로고    scopus 로고
    • BambooTrust: Practical scalable trust management for global public computing
    • Applied Computing 2006 - The 21st Annual ACM Symposium on Applied Computing - Proceedings of the 2006 ACM Symposium on Applied Computing
    • E. Kotsovinos, A. Williams, "BambooTrust: Practical Scalable Trust Management for Global Public Computing," ACM Symposium on Applied Computing, pp.1893 - 1897, Apr. 2006. (Pubitemid 44759114)
    • (2006) Proceedings of the ACM Symposium on Applied Computing , vol.2 , pp. 1893-1897
    • Kotsovinos, E.1    Williams, A.2
  • 27
    • 0034309383 scopus 로고    scopus 로고
    • Trust management through reputation mechanisms
    • DOI 10.1080/08839510050144868
    • G. Zacharia and Pattie Maes, "Trust Management through Reputation Mechanisms," Applied Artificial Intelligence, Vol.14, Issue 9, pp.881-907, Oct. 2000. (Pubitemid 35394323)
    • (2000) Applied Artificial Intelligence , vol.14 , Issue.9 , pp. 881-907
    • Zacharia, G.1    Maes, P.2
  • 28
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the confidant protocol: Cooperation of nodes - fairness in dynamic ad hoc networks
    • S. Buchegger and J.Y.L. Boudec, "Performance Analysis of the Confidant Protocol: Cooperation of Nodes - Fairness in Dynamic Ad Hoc Networks," IEEE/ACM Workshop on MobiHoc'02, pp. 226-236, June 2002.
    • (2002) IEEE/ACM Workshop on MobiHoc'02 , pp. 226-236
    • Buchegger, S.1    Boudec, J.Y.L.2
  • 30
    • 6944251240 scopus 로고    scopus 로고
    • Strategy proof trust management in wireless ad hoc network
    • H. Sun and J. Song, "Strategy Proof Trust Management in Wireless Ad Hoc Network," Canadian Conference 2004, Vol.3, pp.1593 - 1596, May 2004.
    • (2004) Canadian Conference 2004 , vol.3 , pp. 1593-1596
    • Sun, H.1    Song, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.