메뉴 건너뛰기




Volumn 34, Issue 4, 2011, Pages 1138-1149

Building a trusted route in a mobile ad hoc network considering communication reliability and path length

Author keywords

Attribute similarity; Mobile ad hoc network; Trust degree; Trusted routing

Indexed keywords

ATTRIBUTE SIMILARITY; BLACK HOLES; DEGREE OF SIMILARITY; DYNAMIC SOURCE ROUTING PROTOCOLS; MANET ROUTING; MULTI-HOP ROUTE; PACKET DELIVERY; PATH LENGTH; ROUTING LAYERS; ROUTING MECHANISM; ROUTING PERFORMANCE; ROUTING SCHEME; SHORTEST PATH; SOURCE NODES; TRANSMISSION RANGES; TRUST DEGREE; TRUST LEVEL; TRUSTED ROUTING;

EID: 79956101475     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2010.11.007     Document Type: Article
Times cited : (71)

References (23)
  • 1
    • 43149095562 scopus 로고    scopus 로고
    • Multilayer flavoured dynamic source routing in mobile ad-hoc networks
    • DOI 10.1049/iet-com:20070096
    • S. Adibi, and G.B. Agnew Multilayer flavoured dynamic source routing in mobile ad-hoc networks IET Communications 2 5 2008 690 707 (Pubitemid 351641065)
    • (2008) IET Communications , vol.2 , Issue.5 , pp. 690-707
    • Adibi, S.1    Agnew, G.B.2
  • 2
  • 4
    • 67349210618 scopus 로고    scopus 로고
    • On asymptotically optimal routing in large wireless networks and Geometrical Optics analogy
    • R. Catanuto, S. Toumpis, and G. Morabito On asymptotically optimal routing in large wireless networks and Geometrical Optics analogy Computer Networks 53 1 2009 1939 1955
    • (2009) Computer Networks , vol.53 , Issue.1 , pp. 1939-1955
    • Catanuto, R.1    Toumpis, S.2    Morabito, G.3
  • 6
    • 67650753581 scopus 로고    scopus 로고
    • Incentive-based control of ad hoc networks: A performance study
    • J. Gobel, A. Krzesinski, and M. Mandjes Incentive-based control of ad hoc networks: A performance study Computer Networks 53 14 2009 2427 2443
    • (2009) Computer Networks , vol.53 , Issue.14 , pp. 2427-2443
    • Gobel, J.1    Krzesinski, A.2    Mandjes, M.3
  • 7
    • 44649172603 scopus 로고    scopus 로고
    • Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs). Lecture Notes in Computer Science, Information Security Theory and Practices
    • G. Guette, and C. Bryce Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs). Lecture Notes in Computer Science, Information Security Theory and Practices Smart Devices, Convergence and Next Generation Networks 2008 106 116
    • (2008) Smart Devices, Convergence and Next Generation Networks , pp. 106-116
    • Guette, G.1    Bryce, C.2
  • 8
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • D. Johnson, and D. Maltz Dynamic source routing in ad hoc wireless networks Tomasz Imielinski, Hank Korth, Mobile computing 1996 Kluwer Academic Publishers 153 181 chapter 5
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.1    Maltz, D.2
  • 9
    • 77952085286 scopus 로고    scopus 로고
    • AODV-RIP: Improved security in mobile ad hoc networks through route investigation procedure
    • B.S. Kang, H.S. Kim, and I.Y. Ko AODV-RIP: improved security in mobile ad hoc networks through route investigation procedure Concurrency and Computation: Practice & Experience 22 7 2010 816 830
    • (2010) Concurrency and Computation: Practice & Experience , vol.22 , Issue.7 , pp. 816-830
    • Kang, B.S.1    Kim, H.S.2    Ko, I.Y.3
  • 11
    • 68449104742 scopus 로고    scopus 로고
    • On the detection of signaling DoS attacks on 3 G/WiMax wireless networks
    • PC Patrick Lee, T Bu, and T Woo On the detection of signaling DoS attacks on 3 G/WiMax wireless networks Computer Networks 53 15 2009 2601 2616
    • (2009) Computer Networks , vol.53 , Issue.15 , pp. 2601-2616
    • Patrick, C.L.P.1    Bu, T.2    Woo, T.3
  • 12
    • 42649129419 scopus 로고    scopus 로고
    • Future trust management framework for mobile ad hoc networks
    • DOI 10.1109/MCOM.2008.4481349
    • J. Li, R. Li, and J. Kato Future Trust Management Framework for mobile ad hoc networks IEEE Communications Magazine 46 4 2008 108 114 (Pubitemid 351593416)
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 108-114
    • Li, J.1    Li, R.2    Kato, J.3
  • 14
    • 67349173961 scopus 로고    scopus 로고
    • A trust degree based access control in grid environments
    • J. Luo, X. Ni, and J. Yong A trust degree based access control in grid environments Information Science 179 15 2009 2618 2628
    • (2009) Information Science , vol.179 , Issue.15 , pp. 2618-2628
    • Luo, J.1    Ni, X.2    Yong, J.3
  • 15
    • 67549118440 scopus 로고    scopus 로고
    • Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
    • F. Martignon, S. Paris, and A. Capone Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks Computer Networks 53 12 2009 2192 2207
    • (2009) Computer Networks , vol.53 , Issue.12 , pp. 2192-2207
    • Martignon, F.1    Paris, S.2    Capone, A.3
  • 16
    • 38749146509 scopus 로고    scopus 로고
    • Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
    • DOI 10.1016/j.peva.2007.05.004, PII S016653160700048X
    • J. Mundinger, and Boudec J.-Y. Le Analysis of a reputation system for Mobile Ad-Hoc Networks with liars Performance Evaluation 65 34 2008 212 226 (Pubitemid 351179860)
    • (2008) Performance Evaluation , vol.65 , Issue.3-4 , pp. 212-226
    • Mundinger, J.1    Le Boudec, J.-Y.2
  • 18
    • 33747431615 scopus 로고    scopus 로고
    • Incorporating trust and reputation in the DSR protocol for dependable routing
    • DOI 10.1016/j.comcom.2005.10.032, PII S0140366405004226
    • A.A. Pirzada, A. Datta, and C. McDonald Incorporating trust and reputation in the DSR protocol for dependable routing Computer Communications 29 15 2006 2806 2821 (Pubitemid 44251146)
    • (2006) Computer Communications , vol.29 , Issue.15 , pp. 2806-2821
    • Pirzada, A.A.1    Datta, A.2    McDonald, C.3
  • 20
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya, and J.P. Hubaux Securing vehicular ad hoc networks Journal of Computer Security 15 1 2007 39 68 (Pubitemid 46012642)
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.-P.2
  • 21
    • 65949087881 scopus 로고    scopus 로고
    • A trustworthiness-based QoS routing protocol for wireless ad hoc networks
    • M. Yu, and K.K. Leung A trustworthiness-based QoS routing protocol for wireless ad hoc networks IEEE Transactions on Wireless Communications 8 4 2009 1888 1898
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.4 , pp. 1888-1898
    • Yu, M.1    Leung, K.K.2
  • 22
    • 59649116337 scopus 로고    scopus 로고
    • A secure routing protocol against Byzantine attacks for MANETs in adversarial environments
    • M. Yu, M. Zhou, and W. Su A secure routing protocol against Byzantine attacks for MANETs in adversarial environments IEEE Transactions on Vehicular Technology 58 1 2009 449 460
    • (2009) IEEE Transactions on Vehicular Technology , vol.58 , Issue.1 , pp. 449-460
    • Yu, M.1    Zhou, M.2    Su, W.3
  • 23
    • 29144503110 scopus 로고    scopus 로고
    • Attack-resistant cooperation stimulation in autonomous Ad Hoc networks
    • DOI 10.1109/JSAC.2005.857201
    • W. Yu, and K.J.R. Liu Attack-resistant cooperation stimulation in autonomous ad hoc networks IEEE Journal on Selected Areas in Communications 23 12 2005 2260 2271 (Pubitemid 41811977)
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.12 , pp. 2260-2271
    • Yu, W.1    Ray Liu, K.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.