메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 802-808

Misbehavior detection using implicit trust relations in the AODV routing protocol

Author keywords

Ad hoc networks; Ad hoc routing protocol; AODV; Security

Indexed keywords

AD HOC NETWORKS; INTERNET PROTOCOLS; NETWORK PROTOCOLS; NETWORK ROUTING; NETWORK SECURITY; UBIQUITOUS COMPUTING;

EID: 70749150776     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSE.2009.125     Document Type: Conference Paper
Times cited : (20)

References (14)
  • 2
    • 0742292815 scopus 로고    scopus 로고
    • Ad hoc on-demand distance vector (AODV) routing
    • July
    • C. Perkins, E. Belding-Royerand S. Das, "Ad hoc On-Demand Distance Vector (AODV) Routing," RFC3561, July 2003.
    • (2003) RFC3561
    • Perkins, C.1    Belding-Royer, E.2    Das, S.3
  • 6
    • 70449639723 scopus 로고    scopus 로고
    • The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4
    • February
    • D. Johnson, Y. Hu, and D. Maltz, "The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4," RFC4728, February 2007.
    • (2007) RFC4728
    • Johnson, D.1    Hu, Y.2    Maltz, D.3
  • 7
    • 70749083193 scopus 로고    scopus 로고
    • A trust model based routing protocol for secure ad-hoc networks
    • IEEEAC'04
    • X. Li, M. Lyu, and J. Liu, "A Trust Model Based Routing Protocol for Secure Ad-hoc Networks," in Proc.of Aerospace Conference, (IEEEAC'04).
    • Proc.of Aerospace Conference
    • Li, X.1    Lyu, M.2    Liu, J.3
  • 11
    • 70749154468 scopus 로고    scopus 로고
    • Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
    • S. Buchegger and J. Le Boudec, "Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks," in Proc.of the 10th EUROMICRO-PDP.
    • Proc.of the 10th EUROMICRO-PDP
    • Buchegger, S.1    Le Boudec, J.2
  • 12
    • 84903836776 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
    • June
    • P. Ning and K. Sun, "How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols," in Proc. of IEEE Information Assurance Workshop, June 2003.
    • (2003) Proc. of IEEE Information Assurance Workshop
    • Ning, P.1    Sun, K.2
  • 13
    • 84896892936 scopus 로고    scopus 로고
    • Springer, ch. Routing Security in Ad-hoc Wireless Networks
    • M. O. Pervaiz, M. Cardei, and J. Wu, Network Security. Springer, 2006, ch. Routing Security in Ad-hoc Wireless Networks.
    • (2006) Network Security
    • Pervaiz, M.O.1    Cardei, M.2    Wu, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.