메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Evaluating a collaborative defense architecture for MANETs

Author keywords

Capabilities; Distributed firewalls; MANETs

Indexed keywords

COMPROMISED NODES; CRYPTOGRAPHIC OPERATIONS; DEFENSE ARCHITECTURE; DISTRIBUTED FIREWALL; DISTRIBUTED SECURITY; END-TO-END CONNECTIVITY; HOP BY HOP; INTRUSION DETECTION SYSTEMS; LOCAL COMMUNICATIONS; MISBEHAVING NODES; NETWORK BANDWIDTH; NETWORK CAPABILITY;

EID: 77952401470     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IMSAA.2009.5439498     Document Type: Conference Paper
Times cited : (13)

References (12)
  • 1
    • 84872518280 scopus 로고    scopus 로고
    • GloMoSim simulator. http://pcl.cs.ucla.edu/projects/glomosim/.
    • GloMoSim Simulator
  • 3
    • 77952409340 scopus 로고    scopus 로고
    • Deny-by-default distributed security policy enforcement in mobile ad hoc networks
    • September
    • M. Alicherry, A. D. Keromytis, and A. Stavrou. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. SecureComm, September 2009.
    • (2009) SecureComm
    • Alicherry, M.1    Keromytis, A.D.2    Stavrou, A.3
  • 8
    • 37749013560 scopus 로고    scopus 로고
    • Darwin: Distributed and adaptive reputation mechanism for wireless ad-hoc networks
    • J. Jaramillo and R. Srikant. Darwin: Distributed and adaptive reputation mechanism for wireless ad-hoc networks. MOBICOM, 2007.
    • (2007) MOBICOM
    • Jaramillo, J.1    Srikant, R.2
  • 10
    • 0742292815 scopus 로고    scopus 로고
    • Ad Hoc On Demand Distance Vector (AODV) routing
    • C. Perkins, E. Belding-Royer, and S. Das. Ad Hoc On Demand Distance Vector (AODV) Routing. IETF RFC 3561.
    • IETF RFC , vol.3561
    • Perkins, C.1    Belding-Royer, E.2    Das, S.3
  • 12
    • 34748856250 scopus 로고    scopus 로고
    • Mitigating denial-of-service attacks in MANET by distributed packet filtering: A game-theoretic approach
    • March
    • X. Wu and D. K. Y. Yau. Mitigating Denial-of-Service Attacks in MANET by Distributed Packet Filtering: A Game-theoretic Approach. ASIACCS, March 2007.
    • (2007) ASIACCS
    • Wu, X.1    Yau, D.K.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.