메뉴 건너뛰기




Volumn 8, Issue 1, 2011, Pages 89-103

Mechanism design-based secure leader election model for intrusion detection in MANET

Author keywords

intrusion detection systems; Leader election; mechanism design and MANET security.

Indexed keywords

INTRUSION DETECTION; MACHINE DESIGN; MOBILE SECURITY;

EID: 78649356481     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2009.22     Document Type: Article
Times cited : (108)

References (35)
  • 1
    • 39149090875 scopus 로고    scopus 로고
    • A survey on intrusion detection in mobile Ad Hoc networks
    • Springer
    • T. Anantvalee and J. Wu, "A Survey on Intrusion Detection in Mobile Ad Hoc Networks", Wireless/Mobile Network Security, Springer, 2006.
    • (2006) Wireless/Mobile Network Security
    • Anantvalee, T.1    Wu, J.2
  • 2
    • 1542299118 scopus 로고    scopus 로고
    • Ad Hoc-VCG: A truthful and cost-efficient routing protocol for mobile Ad Hoc networks with selfish agents
    • L. Anderegg and S. Eidenbenz, "Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents", Proc. ACM MobiCom, 2003.
    • (2003) Proc. ACM MobiCom
    • Anderegg, L.1    Eidenbenz, S.2
  • 4
    • 79952179081 scopus 로고    scopus 로고
    • Distributed and mobility-adaptive clustering for multimedia support in multi-hop wireless networks
    • S. Basagni, "Distributed and Mobility-Adaptive Clustering for Multimedia Support in Multi-Hop Wireless Networks", Proc. IEEE Int'l Vehicular Technology Conf. (VTC), 1999.
    • (1999) Proc. IEEE Int'l Vehicular Technology Conf. (VTC)
    • Basagni, S.1
  • 8
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol (cooperation of nodes-fairness in dynamic Ad-Hoc networks)
    • S. Buchegger and J. L. Boudec, "Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes-Fairness in Dynamic Ad-Hoc Networks)", Proc. ACM MOBIHOC, 2002.
    • (2002) Proc. ACM MOBIHOC
    • Buchegger, S.1    Boudec, J.L.2
  • 9
    • 2442479712 scopus 로고    scopus 로고
    • IPass: An incentive compatible auction scheme to enable packet forwarding service in MANET
    • K. Chen and K. Nahrstedt, "iPass: An Incentive Compatible Auction Scheme to Enable Packet Forwarding Service in MANET", Proc. Int'l Conf. Distributed Computing Systems, 2004.
    • (2004) Proc. Int'l Conf. Distributed Computing Systems
    • Chen, K.1    Nahrstedt, K.2
  • 15
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for Ad Hoc networks
    • Y. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks", Proc. ACM MOBICOM, 2002.
    • (2002) Proc. ACM MOBICOM
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3
  • 22
    • 12244292723 scopus 로고    scopus 로고
    • Analysis of coalition formaton and cooperation strategies in mobile adhoc networks
    • P. Michiardi and R. Molva, "Analysis of Coalition Formaton and Cooperation Strategies in Mobile Adhoc Networks", J. Ad Hoc Networks, vol. 3, no. 2, pp. 193-219, 2005.
    • (2005) J. Ad Hoc Networks , vol.3 , Issue.2 , pp. 193-219
    • Michiardi, P.1    Molva, R.2
  • 23
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless Ad Hoc networks
    • Feb
    • A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion Detection in Wireless Ad Hoc Networks", IEEE Wireless Comm., vol. 11, no. 1, pp. 48-60, Feb. 2004.
    • (2004) IEEE Wireless Comm. , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 26
    • 84903836776 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile Ad-Hoc routing protocols
    • P. Ning and K. Sun, "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols", Proc. IEEE Information Assurance Workshop, 2003.
    • (2003) Proc. IEEE Information Assurance Workshop
    • Ning, P.1    Sun, K.2
  • 29
    • 39149117050 scopus 로고    scopus 로고
    • A game-theoretic intrusion detection model for mobile Ad-Hoc networks
    • H. Otrok, N. Mohammed, L. Wang, M. Debbabi, and P. Bhattacharya, "A Game-Theoretic Intrusion Detection Model for Mobile Ad-Hoc Networks", J. Computer Comm., vol. 31, no. 4, pp. 708-721, 2008.
    • (2008) J. Computer Comm. , vol.31 , Issue.4 , pp. 708-721
    • Otrok, H.1    Mohammed, N.2    Wang, L.3    Debbabi, M.4    Bhattacharya, P.5
  • 30
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA broadcast authentication protocol
    • A. Perrig, R. Canetti, D. Tygar, and D. Song, "The TESLA Broadcast Authentication Protocol", RSA Cryptobytes, vol. 5, no. 2, pp. 2-13, 2002.
    • (2002) RSA Cryptobytes , vol.5 , Issue.2 , pp. 2-13
    • Perrig, A.1    Canetti, R.2    Tygar, D.3    Song, D.4
  • 35
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless Ad-Hoc networks
    • Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks", Proc. ACM MobiCom, 2000.
    • (2000) Proc. ACM MobiCom
    • Zhang, Y.1    Lee, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.