메뉴 건너뛰기




Volumn , Issue , 2009, Pages 547-554

A routing protocol based on trusted and shortest path selection for mobile ad hoc network

Author keywords

Mobile ad hoc network (MANET); Routing protocol; Security; Trust

Indexed keywords

ACCESS POINTS; AD HOC ON DEMAND DISTANCE VECTOR; AODV PROTOCOLS; IF THERE ARE; MALICIOUS NODES; PEER TO PEER; ROUTING PROTOCOL SECURITY; SECURITY ATTACKS; SELFISH NODE; SHORT-PATH; SHORTEST PATH; SIMULATION RESULT; TRUST MECHANISM; TRUST MODELS;

EID: 77952217399     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MICC.2009.5431438     Document Type: Conference Paper
Times cited : (16)

References (23)
  • 6
    • 41949127322 scopus 로고    scopus 로고
    • Security in Mobile Ad Hoc Networks
    • March-April
    • M.Carvalho, "Security in Mobile Ad Hoc Networks", Security & Privacy, IEEE, Volume 6, Issue 2, March-April 2008 Page(s):72-75.
    • (2008) Security & Privacy, IEEE , vol.6 , Issue.2 , pp. 72-75
    • Carvalho, M.1
  • 7
    • 0037003792 scopus 로고    scopus 로고
    • Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
    • V. Gupta, S. V. Krishnamurthy, and M. Faloutsos, "Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks", In Proc. of MILCOM, 2002, page(s): 202-215.
    • Proc. of MILCOM, 2002 , pp. 202-215
    • Gupta, V.1    Krishnamurthy, S.V.2    Faloutsos, M.3
  • 8
    • 50149105732 scopus 로고    scopus 로고
    • Impact of Denial of Service Attacks on Ad Hoc Networks
    • Aug.
    • I. Aad, J. Hubaux, W. Knightly E, "Impact of Denial of Service Attacks on Ad Hoc Networks", Networking, IEEE/ACM Transactions on Volume16, Issue 4, Aug. 2008 Page(s):791-802.
    • (2008) Networking, IEEE/ACM Transactions on , vol.16 , Issue.4 , pp. 791-802
    • Aad, I.1    Hubaux, J.2    Knightly E, W.3
  • 10
    • 51849126004 scopus 로고    scopus 로고
    • Master's Thesis in Computing Science, Ume° a University, Department of Computing Science, Sweden
    • K. Gorantala, "Routing Protocols in Mobile Ad-hoc Networks.", Master's Thesis in Computing Science, Ume° a University, Department of Computing Science, Sweden, 2006.
    • (2006) Routing Protocols in Mobile Ad-hoc Networks
    • Gorantala, K.1
  • 11
    • 77952180625 scopus 로고    scopus 로고
    • Reliable Routing in Ad Hoc Networks Using Direct Trust Mechanisms
    • The University of Western Australia, Crawley, December 15, chapter 6
    • A. Amir Pirzada, "Reliable Routing in Ad Hoc Networks Using Direct Trust Mechanisms.", School of Computer Science and Software Engineering The University of Western Australia, Crawley, December 15, 2008, chapter 6, Page(s):131-157.
    • (2008) School of Computer Science and Software Engineering , pp. 131-157
    • Amir Pirzada, A.1
  • 12
    • 33747325673 scopus 로고    scopus 로고
    • Vulnerabilities of ad hoc network routing protocols to MAC misbehavior
    • DOI 10.1109/WIMOB.2005.1512897, 1512897, 2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005
    • L. Guang, C. Assi,"Vulnerabilities of Ad Hoc Network Routing Protocols To MAC Misbehavior.", Wireless And Mobile Computing, Networking And Communication, IEEE International Conference on Volume3, 22-24 Aug. 2005 Page(s):146-153. (Pubitemid 44235055)
    • (2005) 2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005 , vol.3 , pp. 146-153
    • Guang, L.1    Assi, C.2
  • 14
    • 0004195002 scopus 로고    scopus 로고
    • K. Fall, and K.Vardhan, Eds., available from
    • K. Fall, and K.Vardhan, Eds., 1999, Ns notes and documentation, available from http://wwwmash.cd.berkeley.edu/ns/.
    • (1999) Ns Notes and Documentation
  • 15
    • 33748363759 scopus 로고    scopus 로고
    • IEEE 802.11 ad hoc networks: Protocols, performance and open issues
    • S.Basagni, M.Conti, S.Giordano, I.Stojmenvoic (Eds), IEEE Press Wiley, New York
    • E. Borgia, G. Anastasi, M.Conti, E.Gregori, 2003, IEEE 802.11 ad hoc networks: protocols, performance and open issues, in: S.Basagni, M.Conti, S.Giordano, I.Stojmenvoic (Eds), Ad hoc Networking, IEEE Press Wiley, New York.
    • (2003) Ad Hoc Networking
    • Borgia, E.1    Anastasi, G.2    Conti, M.3    Gregori, E.4
  • 16
    • 0027629456 scopus 로고
    • Development of WaveLAN, an ISM Band Wireless LAN
    • B. Tuch, "Development of WaveLAN, an ISM Band Wireless LAN", AT&T Tech. J.,vol. 72, no. 4, 1993, page(s): 27-33.
    • (1993) AT&T Tech. J. , vol.72 , Issue.4 , pp. 27-33
    • Tuch, B.1
  • 19
    • 84888415851 scopus 로고    scopus 로고
    • PhD thesis, Department of Computer Science and Engineering, The Chinese University of Hong Kong, Available from
    • A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks, PhD thesis, Department of Computer Science and Engineering, The Chinese University of Hong Kong, Available from: www.cse.cuhk.edu.hk/lyu/student/phd/gigi/term4/.
    • A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks
  • 20
    • 43449107967 scopus 로고    scopus 로고
    • Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
    • June
    • Imran Raza , S. A. Hussain, Identification of malicious nodes in an AODV pure ad hoc network through guard nodes, Computer Communications, v.31 n.9, p.1796-1802, June, 2008.
    • (2008) Computer Communications , vol.31 , Issue.9 , pp. 1796-1802
    • Raza, I.1    Hussain, S.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.