메뉴 건너뛰기




Volumn 16, Issue 8, 2010, Pages 2221-2236

RADAR: A reputation-driven anomaly detection system for wireless mesh networks

Author keywords

Anomaly detection; Network security; Reputation management; Wireless mesh networks

Indexed keywords

ANOMALOUS EVENTS; ANOMALY DETECTION; ANOMALY DETECTION SYSTEMS; COMMUNICATION MODE; CROSS-LAYER; DESIGN ARCHITECTURE; DETECTION ACCURACY; DUAL-CORE; FALSE POSITIVE RATES; INTRUSION PREVENTION; MESH NODES; NETWORK FAILURE; PERFORMANCE METRICS; RADAR PROTOTYPES; REPUTATION MANAGEMENT; SIMULATION RESULT; SPATIO-TEMPORAL PROPERTIES; WIRELESS MESH;

EID: 78049530839     PISSN: 10220038     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11276-010-0255-1     Document Type: Article
Times cited : (21)

References (30)
  • 1
    • 13844276649 scopus 로고    scopus 로고
    • Computer networks: Editorial
    • DOI 10.1016/j.comnet.2005.01.002, PII S1389128605000149
    • I. F. Akyildiz X. Wang 2005 Wireless mesh networks: A survey Computer Networks 47 445 487 1152.68319 10.1016/j.comnet.2005.01.002 (Pubitemid 40242421)
    • (2005) Computer Networks , vol.47 , Issue.4 , pp. 443-444
    • Akyildiz, I.F.1    Rudin, H.2
  • 2
    • 48049122172 scopus 로고    scopus 로고
    • Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR
    • Baras, J. S., Radosavac, S., et al. (2007). Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR. In Proceedings of MILCOM2007.
    • (2007) Proceedings of MILCOM2007.
    • Baras, J.S.1    Radosavac, S.2
  • 3
    • 24744432675 scopus 로고    scopus 로고
    • Self-policing mobile Ad-Hoc networks by reputation systems
    • 10.1109/MCOM.2005.1470831
    • S. Buchegger J.-Y. Le Boudec 2009 Self-policing mobile Ad-Hoc networks by reputation systems IEEE Communications Magazine 43 7 101 107 10.1109/MCOM.2005.1470831
    • (2009) IEEE Communications Magazine , vol.43 , Issue.7 , pp. 101-107
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 4
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol
    • Lausanne, Switzerland, June 2002.
    • Buchegger, S., & Le Boudec, J.-Y. (2002). Performance analysis of the CONFIDANT protocol. In Proceedings of 3rd ACM MobiHoc'02 (pp. 226-236). Lausanne, Switzerland, June 2002.
    • (2002) Proceedings of 3rd ACM MobiHoc'02 , pp. 226-236
    • Buchegger, S.1    Boudec, L.2    J, -Y.3
  • 5
    • 54649085149 scopus 로고    scopus 로고
    • Graph similarity and distance in graphs
    • 0889.05043 10.1007/s000100050025 1600596
    • G. Chartrand G. Kubicki M. Schultz 1998 Graph similarity and distance in graphs Aequationes Mathematicae 55 1-2 129 145 0889.05043 10.1007/s000100050025 1600596
    • (1998) Aequationes Mathematicae , vol.55 , Issue.12 , pp. 129-145
    • Chartrand, G.1    Kubicki, G.2    Schultz, M.3
  • 6
    • 33847681941 scopus 로고    scopus 로고
    • Convergence of the Lloyd algorithm for computing centroidal voronoi tessellations
    • DOI 10.1137/040617364
    • Q. Du M. Emelianenko L. Ju 2006 Convergence of the Lloyd algorithm for computing centroidal Voronoi tessellations SIAM Journal of Numerical Analysis 44 102 119 1115.65017 10.1137/040617364 2217374 (Pubitemid 46352064)
    • (2006) SIAM Journal on Numerical Analysis , vol.44 , Issue.1 , pp. 102-119
    • Du, Q.1    Emelianenko, M.2    Ju, L.3
  • 9
    • 4544283175 scopus 로고    scopus 로고
    • SORI: A secure and objective reputation-based incentive scheme for ad hoc networks
    • Atlanta, USA, Mar.
    • He, Q., Wu, D., & Khosla, P. (2004). SORI: A secure and objective reputation-based incentive scheme for ad hoc networks. In Proceedings of IEEE WCNC'04 (pp. 825-830). Atlanta, USA, Mar.
    • (2004) Proceedings of IEEE WCNC'04 , pp. 825-830
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 12
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Boston, USA, Aug., 2000.
    • Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of 6th ACM MobiCom'00. (pp. 255-265). Boston, USA, Aug., 2000.
    • (2000) Proceedings of 6th ACM MobiCom'00. , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 13
    • 29244436370 scopus 로고    scopus 로고
    • Taxonomy of trust: Categorizing P2P reputation systems
    • DOI 10.1016/j.comnet.2005.07.011, PII S138912860500215X
    • S. Marti H. G. Molina 2006 Taxonomy of trust: Categorizing P2P reputation systems Computer Networks 50 472 484 1095.68557 10.1016/j.comnet.2005.07.011 (Pubitemid 41828401)
    • (2006) Computer Networks , vol.50 , Issue.4 , pp. 472-484
    • Marti, S.1    Garcia-Molina, H.2
  • 15
    • 85113133621 scopus 로고    scopus 로고
    • CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • Portoroz, Slovenia, Sept., 2002.
    • Michiardi, P., & Molva, R. (2002). CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the 6th IFIP Conference on Security Communications, and Multimedia (pp. 107-121). Portoroz, Slovenia, Sept., 2002.
    • (2002) Proceedings of the 6th IFIP Conference on Security Communications, and Multimedia , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 18
    • 4444307562 scopus 로고    scopus 로고
    • Multi-channel MAC for ad hoc networks: Handling multi-channel hidden terminals using a single transceiver
    • May, 2004.
    • So, J., & Vaidya, N. (2004) Multi-channel MAC for ad hoc networks: Handling multi-channel hidden terminals using a single transceiver. In Proceedings of the 5th ACM MobiHoc'04 (pp. 222-233). May, 2004.
    • (2004) Proceedings of the 5th ACM MobiHoc'04 , pp. 222-233
    • So, J.1    Vaidya, N.2
  • 19
    • 8344276670 scopus 로고    scopus 로고
    • A fair medium access control protocol for ad hoc networks with MIMO links
    • Mar., 2004.
    • Sundaresan, K. Sivakumar, R., Ingram, M. A. & Chang, T.-Y. (2004). A fair medium access control protocol for ad hoc networks with MIMO links. In Proceedings of INFOCOM (pp. 2559-2570). Mar., 2004.
    • (2004) Proceedings of INFOCOM , pp. 2559-2570
    • Sundaresan, K.1    Sivakumar, R.2    Ingram, M.A.3    Chang, T.-Y.4
  • 23
    • 32144440287 scopus 로고    scopus 로고
    • Characterizing the capacity region in multi-radio multi-channel wireless mesh networks
    • Aug., 2005.
    • Kodialam, M., & Nandagopal, T. (2005). Characterizing the capacity region in multi-radio multi-channel wireless mesh networks. In Proceedings of the 11th ACM MobiCom (pp. 73-87). Aug., 2005.
    • (2005) Proceedings of the 11th ACM MobiCom , pp. 73-87
    • Kodialam, M.1    Nandagopal, T.2
  • 26
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • 10.1023/A:1024600519144
    • Y. Zhang W. Lee Y. Huang 2003 Intrusion detection techniques for mobile wireless networks ACM Wireless Networks Journal 9 5 545 556 10.1023/A: 1024600519144
    • (2003) ACM Wireless Networks Journal , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.3
  • 27
    • 78049530653 scopus 로고    scopus 로고
    • An observation-centric analysis on the modeling of anomaly-based intrusion detection
    • Z. Zhang H. Shen Y. Sang 2007 An observation-centric analysis on the modeling of anomaly-based intrusion detection International Journal of Network Security 4 3 292 305
    • (2007) International Journal of Network Security , vol.4 , Issue.3 , pp. 292-305
    • Zhang, Z.1    Shen, H.2    Sang, Y.3
  • 28
    • 70449515329 scopus 로고    scopus 로고
    • On achieving cost-sensitive anomaly detection and response in mobile Ad Hoc networks
    • June 2009 June 2009.
    • Zhang, Z., Ho, P-.H., & Naït-Abdesselam, F. (2009). On achieving cost-sensitive anomaly detection and response in mobile Ad Hoc networks, In Proceedings of IEEE International Conference on Communications (ICC'09)
    • (2009) Proceedings of IEEE International Conference on Communications (ICC'09)
    • Zhang, Z.1
  • 30
    • 33845809712 scopus 로고    scopus 로고
    • Hermes a quantitative trust establishment framework for reliable data packet delivery in MANETs
    • C. Zouridaki B. L. Mark M. Hejmo R. K. Thomas 2007 Hermes a quantitative trust establishment framework for reliable data packet delivery in MANETs Journal of Computer Security 15 1 3 38
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 3-38
    • Zouridaki, C.1    Mark, B.L.2    Hejmo, M.3    Thomas, R.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.