메뉴 건너뛰기




Volumn , Issue , 2009, Pages

SReD: A secure reputation-based dynamic window scheme for disruption-tolerant networks

Author keywords

Disruption tolerant networks; Network security; Reputation based routing

Indexed keywords

BLACK HOLES; DATA-FORWARDING; DENIAL OF SERVICE; DISRUPTION-TOLERANT NETWORKS; EXISTING METHOD; IN-NETWORK; LOW-COST SOLUTION; MULTIPATH ROUTING PROTOCOLS; PROBABILISTIC ROUTING; RESOURCE-CONSTRAINED; ROUTING LAYERS; SECURITY STRATEGIES;

EID: 77951457637     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2009.5379935     Document Type: Conference Paper
Times cited : (12)

References (22)
  • 1
    • 20344383943 scopus 로고    scopus 로고
    • Probabilistic routing in intermittently connected networks
    • A. Lindgren, A. Doria, and O. Schelén, "Probabilistic routing in intermittently connected networks," SIGMOBILE Mob. Comput. Commun. Rev., vol.7, no.3, pp. 19-20, 2003.
    • (2003) SIGMOBILE Mob. Comput. Commun. Rev. , vol.7 , Issue.3 , pp. 19-20
    • Lindgren, A.1    Doria, A.2    Schelén, O.3
  • 2
    • 0003902865 scopus 로고    scopus 로고
    • Epidemic routing for partially-connected ad hoc networks
    • A. Vahdat and D. Becker, "Epidemic routing for partially-connected ad hoc networks," Tech. Rep., 2000.
    • (2000) Tech. Rep.
    • Vahdat, A.1    Becker, D.2
  • 3
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • DOI 10.1007/s11276-004-4744-y
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," Wirel. Netw., vol.11, no.1-2, pp. 21-38, 2005. (Pubitemid 40536374)
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 11
    • 7744225358 scopus 로고    scopus 로고
    • Efficient identity-based security schemes for ad hoc network routing protocols
    • M. Bohio and A. Miri, "Efficient identity-based security schemes for ad hoc network routing protocols," Ad Hoc Networks, pp. 309-317, 2004.
    • (2004) Ad Hoc Networks , pp. 309-317
    • Bohio, M.1    Miri, A.2
  • 12
    • 7744232568 scopus 로고    scopus 로고
    • Tids: Threshold and identity-based security scheme for wireless ad hoc networks
    • July
    • H. Deng and D. P. Agrawal, "Tids: threshold and identity-based security scheme for wireless ad hoc networks," Ad Hoc Networks, pp. 291-307, July 2004.
    • (2004) Ad Hoc Networks , pp. 291-307
    • Deng, H.1    Agrawal, D.P.2
  • 14
    • 77951452394 scopus 로고    scopus 로고
    • A secure credit based incentive scheme for delay tolerant networks
    • Aug.25-27.
    • Z. Haojin, L. Xiaodong, L. Rongxing, and S. Xuemin, "A secure credit based incentive scheme for delay tolerant networks," in Chinacom'08. IEEE, Aug.25-27.
    • Chinacom'08. IEEE
    • Haojin, Z.1    Xiaodong, L.2    Rongxing, L.3    Xuemin, S.4
  • 21
    • 84942246351 scopus 로고    scopus 로고
    • Identity based authenticated key agreement protocols from pairings
    • 00
    • L. Chen and C. Kudla, "Identity based authenticated key agreement protocols from pairings," csfw, vol.00, p. 219, 2003.
    • (2003) Csfw , pp. 219
    • Chen, L.1    Kudla, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.