메뉴 건너뛰기




Volumn , Issue , 2009, Pages 985-992

A game theoretic approach for securing AODV in emergency mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC ON DEMAND DISTANCE VECTOR; BLACK HOLES; FOREST FIRES; LEGACY NETWORKS; NETWORK SIMULATOR NS-2; NEXT GENERATION NETWORK; NON-COOPERATIVE GAME THEORY; SECURE ROUTING; TERRORIST ATTACKS;

EID: 77951287085     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2009.5355020     Document Type: Conference Paper
Times cited : (21)

References (16)
  • 1
    • 84959237276 scopus 로고    scopus 로고
    • Securing ad hoc networks in extreme emergency cases
    • Paris, France
    • E. A. Panaousis and C. Politis, "Securing ad hoc networks in extreme emergency cases," in WWRF, Paris, France, 2009.
    • (2009) WWRF
    • Panaousis, E.A.1    Politis, C.2
  • 3
    • 61349175330 scopus 로고    scopus 로고
    • Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks
    • Feb.
    • J. Liu, F. Yu, C.-H. Lung, and H. Tang, "Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks," IEEE Transactions on Wireless Communications, vol. 8, no. 2, pp. 806-815, Feb. 2009.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.2 , pp. 806-815
    • Liu, J.1    Yu, F.2    Lung, C.-H.3    Tang, H.4
  • 6
    • 77951291119 scopus 로고    scopus 로고
    • An adaptive qos routing solution for manet based multimedia communications in emergency cases
    • Athens, Greece
    • T. A. Ramrekha and C. Politis, "An adaptive qos routing solution for manet based multimedia communications in emergency cases," in ICST Mobilight, Athens, Greece, 2009.
    • (2009) ICST Mobilight
    • Ramrekha, T.A.1    Politis, C.2
  • 7
    • 77951279753 scopus 로고    scopus 로고
    • Game theoretic analysis of security in mobile ad hoc networks
    • Sophia-Antipolis
    • M. Pietro and M. Refik, "Game theoretic analysis of security in mobile ad hoc networks," in Research Report RR-02-070, Institut Eurecom, Sophia-Antipolis, 2002.
    • (2002) Research Report RR-02-070, Institut Eurecom
    • Pietro, M.1    Refik, M.2
  • 8
    • 33947628137 scopus 로고    scopus 로고
    • Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
    • W. Yu and K. R. Liu, "Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks," IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 507-521, 2007.
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.5 , pp. 507-521
    • Yu, W.1    Liu, K.R.2
  • 10
    • 32644453532 scopus 로고    scopus 로고
    • Security enforcement in wireless sensor networks: A framework based on non-cooperative games
    • DOI 10.1016/j.pmcj.2005.12.001, PII S1574119205000714, Security in Wireless Mobile Computing Systems
    • A. Agah, K. Basu, and S. K. Das, "Security enforcement in wireless sensor networks: A framework based on non-cooperative games," Pervasive and Mobile Computing, vol.2, no.2, pp. 137-158, 2006. (Pubitemid 43243856)
    • (2006) Pervasive and Mobile Computing , vol.2 , Issue.2 , pp. 137-158
    • Agah, A.1    Basu, K.2    Das, S.K.3
  • 11
    • 0001341422 scopus 로고    scopus 로고
    • Dsr: The dynamic source routing protocol for multi-hop wireless ad hoc networks
    • edited by Charles E. Perkins, Chapter 5. Addison-Wesley
    • D. B. Johnson, D. A. Maltz, and J. Broch, "Dsr: The dynamic source routing protocol for multi-hop wireless ad hoc networks," in In Ad Hoc Networking, edited by Charles E. Perkins, Chapter 5. Addison-Wesley, 2001, pp. 139-172.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2    Broch, J.3
  • 16
    • 77951286147 scopus 로고    scopus 로고
    • [Online]. Available
    • [Online]. Available: http://www.wltl.ee.upatras.gr/humo/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.