메뉴 건너뛰기




Volumn , Issue , 2010, Pages 818-825

A distributed trust model for securing mobile ad hoc networks

Author keywords

Ad hoc networks; Cluster; Privacy; Security; Trust

Indexed keywords

BANDWIDTH-CONSTRAINED; CLUSTER; CLUSTERING MECHANISM; COMMUNICATION LINKS; CRYPTOGRAPHIC COMPUTATIONS; DISTRIBUTED TRUST MODEL; ENERGY SOURCE; FIXED NETWORKS; MOBILE NODES; MONITORING SYSTEM; PHYSICAL SECURITY; PRIVACY; QUASI-STATIC; ROBUST SECURITY; SECURITY; SECURITY ENFORCEMENT; SELECTIVE FORWARDING; TRUST; TRUST-BASED SECURITY; WIRELESS COMMUNICATION DEVICES;

EID: 79951788748     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EUC.2010.127     Document Type: Conference Paper
Times cited : (12)

References (28)
  • 1
    • 65949118246 scopus 로고    scopus 로고
    • A trust based clustering framework for securing ad hoc networks
    • Ghaziabad, India CCIS 31
    • P Chatterjee, I. Sengupta, and S. K. Ghosh, A Trust Based Clustering Framework for Securing Ad Hoc Networks, in Proc. of ICISTM 2009, Ghaziabad, India, 2009. CCIS 31, pp. 313-324.
    • (2009) Proc. of ICISTM 2009 , pp. 313-324
    • Chatterjee, P.1    Sengupta, I.2    Ghosh, S.K.3
  • 2
    • 1342306709 scopus 로고    scopus 로고
    • Security for cluster based ad hoc networks
    • Varadharajan et al, Security for cluster based ad hoc networks, in: Proc. of Computer Communications 27 (2004), pp. 488-501.
    • (2004) Proc. of Computer Communications , vol.27 , pp. 488-501
    • Varadharajan1
  • 3
    • 40249091644 scopus 로고    scopus 로고
    • Trust and mobility-based clustering algorithm for Secure mobile ad hoc networks
    • October 29 -November 03 ICSNC. IEEE Computer Society, Washington, DC
    • Rachedi et al, Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks' in: Proc. of the international Conference on Systems and Networks Communication (October 29 -November 03, 2006). ICSNC. IEEE Computer Society, Washington, DC, 72.
    • (2006) Proc. of the International Conference on Systems and Networks Communication , pp. 72
    • Rachedi1
  • 15
    • 33745257035 scopus 로고    scopus 로고
    • Quantifying trust in mobile ad hoc networks
    • Waltham USA, April 18-21
    • Virendra et al, Quantifying trust in Mobile ad hoc networks, in: Proc. of KIMAS 2005, Waltham USA, April 18-21.
    • Proc. of KIMAS 2005
    • Virendra1
  • 19
    • 0037003792 scopus 로고    scopus 로고
    • Denial of service attacks at the MAC layer in wireless ad hoc networks
    • V. Gupta, S. V. Krishnamurthy, and M. Faloutsos, Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks, in: Proc. of MILCOM, 2002.
    • (2002) Proc. of MILCOM
    • Gupta, V.1    Krishnamurthy, S.V.2    Faloutsos, M.3
  • 28
    • 79951799206 scopus 로고    scopus 로고
    • NS-2: The network simulator
    • NS-2: The Network Simulator, UC Berkeley, http://www.isi.edu/nsnam/ns.
    • UC Berkeley


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.