메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1443-1448

Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET

Author keywords

AODV; Intrusion detection; MANET; Security

Indexed keywords

INTERNET PROTOCOLS; MOBILE AD HOC NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; ROUTING PROTOCOLS;

EID: 70549106079     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1582379.1582695     Document Type: Conference Paper
Times cited : (29)

References (17)
  • 1
    • 85184637643 scopus 로고    scopus 로고
    • Elizabeth M. Royer, Chai-Keong Toh. A Review of Current outing Protocols for Ad Hoc Mobile Wireless Networks . IEEE Personal Communications. April 1999.
    • Elizabeth M. Royer, Chai-Keong Toh. " A Review of Current outing Protocols for Ad Hoc Mobile Wireless Networks ". IEEE Personal Communications. April 1999.
  • 2
    • 36849010124 scopus 로고    scopus 로고
    • A Survey on Attacks and ountermeasures in Mobile Ad Hoc Networks
    • Chapter 12, Springer
    • B.Wu, J.Chen, J.Wu, M. Cardei. "A Survey on Attacks and ountermeasures in Mobile Ad Hoc Networks". Wireless Mobile Networks Security, Chapter 12, Springer 2006.
    • (2006) Wireless Mobile Networks Security
    • Wu, B.1    Chen, J.2    Wu, J.3    Cardei, M.4
  • 4
    • 70350341717 scopus 로고    scopus 로고
    • A Survey on Intrusion Detection in obile Ad Hoc Networks
    • Springer
    • T. Anantvalee, J. Wu. "A Survey on Intrusion Detection in obile Ad Hoc Networks". Wireless Mobile Networks Security, pp 170-196, Springer 2006.
    • (2006) Wireless Mobile Networks Security , pp. 170-196
    • Anantvalee, T.1    Wu, J.2
  • 5
    • 85184633726 scopus 로고    scopus 로고
    • Laura M.Feeney, M. Nilsson. Investigating the Energy onsumption of a Wireless Network Interface in an Ad Hoc Networking Environment in INFOCOM 2001, 22-26 April, 2001, Alaska, USA.
    • Laura M.Feeney, M. Nilsson. "Investigating the Energy onsumption of a Wireless Network Interface in an Ad Hoc Networking Environment" in INFOCOM 2001, 22-26 April, 2001, Alaska, USA.
  • 6
    • 85184652569 scopus 로고    scopus 로고
    • Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, iraj K. Jha. A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols IEEE Transactions on Mobile Computing, :February 2006,pp.128-143.
    • Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, iraj K. Jha. "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols" IEEE Transactions on Mobile Computing, :February 2006,pp.128-143.
  • 7
    • 0013138682 scopus 로고    scopus 로고
    • Secure Routing for Mobile Ad oc Networks
    • Jan
    • P. Papadimitratos and Z. J. Haas, Secure Routing for Mobile Ad oc Networks, In Proc. of CNDS 2002, Jan. 2002.
    • (2002) Proc. of CNDS
    • Papadimitratos, P.1    Haas, Z.J.2
  • 12
    • 77951455588 scopus 로고    scopus 로고
    • Core: Collaborative Reputation echanism to enforce node cooperation in Mobile Ad Hoc Networks
    • N° RR-02-062, Sophia-Antipolis, France
    • P.Michiardi, R.Molva. "Core: Collaborative Reputation echanism to enforce node cooperation in Mobile Ad Hoc Networks" Research Report N° RR-02-062, Sophia-Antipolis, France
    • Research Report
    • Michiardi, P.1    Molva, R.2
  • 13
    • 33646410469 scopus 로고    scopus 로고
    • Performance Comparison f Trusted-Based Reactive Routing Protocols
    • June
    • A.A.Pirzada, C.McDonald, A.Datta, "Performance Comparison f Trusted-Based Reactive Routing Protocols," IEEE Transactions on Mobile Computing, Vol.5, No.6, June 2006, pp.695-710.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.6 , pp. 695-710
    • Pirzada, A.A.1    McDonald, C.2    Datta, A.3
  • 15
    • 85184651923 scopus 로고    scopus 로고
    • www.openssl.org
  • 17
    • 33144465932 scopus 로고    scopus 로고
    • Information Theoretic Framework of Trust odeling and Evaluation for Ad Hoc Networks
    • February
    • Y.L.Sun, et al., Information Theoretic Framework of Trust odeling and Evaluation for Ad Hoc Networks, IEEE JSAC, Vol 24, no.2, February, 2006.
    • (2006) IEEE JSAC , vol.24 , Issue.2
    • Sun, Y.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.