메뉴 건너뛰기




Volumn 60, Issue 5, 2011, Pages 2253-2264

Reliability assessment for wireless mesh networks under probabilistic region failure model

Author keywords

Network reliability; region failure; wireless mesh networks

Indexed keywords

ESTIMATION ERRORS; FAILURE MODEL; FLOW CAPACITY; GRID PARTITION; KEY FEATURE; LARGE REGIONS; MALICIOUS ATTACK; NATURAL DISASTERS; NETWORK DESIGNER; NETWORK PROTECTION; NETWORK RELIABILITY; OPEN ENVIRONMENT; REGION FAILURE; RELIABILITY ASSESSMENTS; THEORETICAL FRAMEWORK;

EID: 79959281135     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2011.2114684     Document Type: Article
Times cited : (41)

References (38)
  • 1
    • 61349151189 scopus 로고    scopus 로고
    • Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks
    • Feb.
    • M. Khabbazian, H. Mercier, and V. K. Bhargava, "Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks," IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 736-745, Feb. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.2 , pp. 736-745
    • Khabbazian, M.1    Mercier, H.2    Bhargava, V.K.3
  • 2
    • 33748622050 scopus 로고    scopus 로고
    • MASK: Anonymous on-demand routing in mobile Ad Hoc networks
    • DOI 10.1109/TWC.2006.1687761, 1687761
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Mask: Anonymous on-demand routing in mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2376-2385, Sep. 2006. (Pubitemid 44376150)
    • (2006) IEEE Transactions on Wireless Communications , vol.5 , Issue.9 , pp. 2376-2385
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 3
    • 35448965082 scopus 로고    scopus 로고
    • Two tier secure routing protocol for heterogeneous sensor networks
    • DOI 10.1109/TWC.2007.06095
    • X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, "Two-tier secure routing protocol for heterogeneous sensor networks," IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3395-3401, Sep. 2007. (Pubitemid 47625218)
    • (2007) IEEE Transactions on Wireless Communications , vol.6 , Issue.9 , pp. 3395-3401
    • Du, X.1    Guizani, M.2    Xiao, Y.3    Chen, H.-H.4
  • 4
    • 66449085294 scopus 로고    scopus 로고
    • A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks
    • Jun.
    • H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto, and N. Kato, "A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks," IEEE Trans. Veh. Technol., vol. 58, no. 5, pp. 2471-2481, Jun. 2009.
    • (2009) IEEE Trans. Veh. Technol , vol.58 , Issue.5 , pp. 2471-2481
    • Nakayama, H.1    Kurosawa, S.2    Jamalipour, A.3    Nemoto, Y.4    Kato, N.5
  • 5
    • 65949087881 scopus 로고    scopus 로고
    • A trustworthiness-based QoS routing protocol for wireless ad hoc networks
    • Apr.
    • M. Yu and K. K. Leung, "A trustworthiness-based QoS routing protocol for wireless ad hoc networks," IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 1888-1898, Apr. 2009.
    • (2009) IEEE Trans. Wireless Commun , vol.8 , Issue.4 , pp. 1888-1898
    • Yu, M.1    Leung, K.K.2
  • 6
    • 57949111587 scopus 로고    scopus 로고
    • Reliable routing in networks with generalized link failure events
    • Dec.
    • S. Stefanakos, "Reliable routing in networks with generalized link failure events," IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1331-1339, Dec. 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.6 , pp. 1331-1339
    • Stefanakos, S.1
  • 7
    • 0036986441 scopus 로고    scopus 로고
    • An on-demand secure routing protocol resilient to Byzantine failures
    • B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An on-demand secure routing protocol resilient to Byzantine failures," in Proc. ACM Wise, 2002, pp. 21-30.
    • (2002) Proc. ACM Wise , pp. 21-30
    • Awerbuch, B.1    Holmer, D.2    Nita-Rotaru, C.3    Rubens, H.4
  • 8
    • 34548305267 scopus 로고    scopus 로고
    • Reliable broadcast in wireless networks with probabilistic failures
    • DOI 10.1109/INFCOM.2007.89, 4215671, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • V. Bhandari and N. H. Vaidya, "Reliable broadcast in wireless networks with probabilistic failures," in Proc. INFOCOM, 2007, pp. 715-723. (Pubitemid 47334289)
    • (2007) Proceedings - IEEE INFOCOM , pp. 715-723
    • Bhandari, V.1    Vaidya, N.H.2
  • 9
    • 36048943071 scopus 로고    scopus 로고
    • R-sentry: Providing continuous sensor services against random node failures
    • DOI 10.1109/DSN.2007.79, 4272975, Proceedings - 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007
    • S. Yu and Y. Zhang, "R-sentry: Providing continuous sensor services against random node failures," in Proc. 37th Annu. IEEE/IFIP Int. Conf. Dependable Syst. Netw., 2007, pp. 235-244. (Pubitemid 350080429)
    • (2007) Proceedings of the International Conference on Dependable Systems and Networks , pp. 235-244
    • Yu, S.1    Zhang, Y.2
  • 10
    • 34247184576 scopus 로고    scopus 로고
    • Fast local rerouting for handling transient link failures
    • DOI 10.1109/TNET.2007.892851
    • S. Nelakuditi, S. Lee, Y. Yu, Z.-L. Zhang, and C.-N. Chuah, "Fast local rerouting for handling transient link failures," IEEE/ACM Trans. Netw., vol. 15, no. 2, pp. 359-372, Apr. 2007. (Pubitemid 46621616)
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.2 , pp. 359-372
    • Nelakuditi, S.1    Lee, S.2    Yu, Y.3    Zhang, Z.-L.4    Chuah, C.-N.5
  • 11
    • 57949094926 scopus 로고    scopus 로고
    • Bandwidth guaranteed routing with fast restoration against link and node failures
    • Dec.
    • R. S. Bhatia, M. Kodialam, T. V. Lakshman, and S. Sengupta, "Bandwidth guaranteed routing with fast restoration against link and node failures," IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1321-1330, Dec. 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.6 , pp. 1321-1330
    • Bhatia, R.S.1    Kodialam, M.2    Lakshman, T.V.3    Sengupta, S.4
  • 12
    • 77953310884 scopus 로고    scopus 로고
    • On the feasibility and efficiency of protection routing in IP networks
    • K.-W. Kwong, L. Gao, R. Guerin, and Z.-L. Zhang, "On the feasibility and efficiency of protection routing in IP networks," in Proc. INFOCOM, 2010, pp. 1-9.
    • (2010) Proc. INFOCOM , pp. 1-9
    • Kwong, K.-W.1    Gao, L.2    Guerin, R.3    Zhang, Z.-L.4
  • 13
    • 77953300333 scopus 로고    scopus 로고
    • Designing low-capacity backup networks for fast restoration
    • R. Banner and A. Orda, "Designing low-capacity backup networks for fast restoration," in Proc. INFOCOM, 2010, pp. 1864-1872.
    • (2010) Proc. INFOCOM , pp. 1864-1872
    • Banner, R.1    Orda, A.2
  • 16
    • 39049126617 scopus 로고    scopus 로고
    • Fault-tolerance in sensor networks: A new evaluation metric
    • A. Sen, B. H. Shen, L. Zhou, and B. Hao, "Fault-tolerance in sensor networks: A new evaluation metric," in Proc. INFOCOM, 2006, pp. 1-12.
    • (2006) Proc. INFOCOM , pp. 1-12
    • Sen, A.1    Shen, B.H.2    Zhou, L.3    Hao, B.4
  • 17
  • 19
    • 62349108771 scopus 로고    scopus 로고
    • Assessing the vulnerability of geographically correlated network failures
    • S. Neumayer, G. Zussman, R. Cohen, and E. Modiano, "Assessing the vulnerability of geographically correlated network failures," in Proc. MILCOM, 2008, pp. 1-6.
    • (2008) Proc. MILCOM , pp. 1-6
    • Neumayer, S.1    Zussman, G.2    Cohen, R.3    Modiano, E.4
  • 20
    • 70349686850 scopus 로고    scopus 로고
    • Assessing the vulnerability of the fiber infrastructure to disasters
    • S. Neumayer, G. Zussman, R. Cohen, and E. Modiano, "Assessing the vulnerability of the fiber infrastructure to disasters," in Proc. INFOCOM, 2009, pp. 1566-1574.
    • (2009) Proc. INFOCOM , pp. 1566-1574
    • Neumayer, S.1    Zussman, G.2    Cohen, R.3    Modiano, E.4
  • 21
    • 77953317622 scopus 로고    scopus 로고
    • Network reliability with geographically correlated failures
    • S. Neumayer and E. Modiano, "Network reliability with geographically correlated failures," in Proc. INFOCOM, 2010, pp. 1658-1666.
    • (2010) Proc. INFOCOM , pp. 1658-1666
    • Neumayer, S.1    Modiano, E.2
  • 23
    • 70350131484 scopus 로고    scopus 로고
    • Topology design of undersea cables considering survivability under major disasters
    • W. Wu, B. Moran, J. Manton, and M. Zukerman, "Topology design of undersea cables considering survivability under major disasters," in Proc. WAINA, 2009, pp. 1154-1159.
    • (2009) Proc. WAINA , pp. 1154-1159
    • Wu, W.1    Moran, B.2    Manton, J.3    Zukerman, M.4
  • 24
    • 79551631221 scopus 로고    scopus 로고
    • Assessing the impact of geographically correlated failures on overlay-based data dissemination
    • K. Kim and N. Venkatasabramanian, "Assessing the impact of geographically correlated failures on overlay-based data dissemination," in Proc. GLOBECOM, 2010, pp. 1-5.
    • (2010) Proc. GLOBECOM , pp. 1-5
    • Kim, K.1    Venkatasabramanian, N.2
  • 27
    • 77953309818 scopus 로고    scopus 로고
    • Charactering the spread of correlated failures in large wireless networks
    • Y. Xu and W. Wang, "Charactering the spread of correlated failures in large wireless networks," in Proc. INFOCOM, 2010, pp. 1-9.
    • (2010) Proc. INFOCOM , pp. 1-9
    • Xu, Y.1    Wang, W.2
  • 28
    • 78649281113 scopus 로고    scopus 로고
    • Data preservation under spatial failures in sensor networks
    • N. H. Azimi, X. Hou, H. Gupta, and J. Gao, "Data preservation under spatial failures in sensor networks," in Proc. MOBIHOC, 2010, pp. 171-180.
    • (2010) Proc. MOBIHOC , pp. 171-180
    • Azimi, N.H.1    Hou, X.2    Gupta, H.3    Gao, J.4
  • 29
    • 70350692585 scopus 로고    scopus 로고
    • Securing wireless sensor networks: A survey
    • Sep.
    • Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: A survey," IEEE Commun. Surveys Tuts., vol. 10, no. 3, pp. 6-28, Sep. 2008.
    • (2008) IEEE Commun. Surveys Tuts. , vol.10 , Issue.3 , pp. 6-28
    • Zhou, Y.1    Fang, Y.2    Zhang, Y.3
  • 30
    • 77957671484 scopus 로고    scopus 로고
    • Analysis of attack models via unified modeling language in wireless sensor networks: A survey study
    • S. Hong and S. Lim, "Analysis of attack models via unified modeling language in wireless sensor networks: A survey study," in Proc. WCNIS, 2010, pp. 692-696.
    • (2010) Proc. WCNIS , pp. 692-696
    • Hong, S.1    Lim, S.2
  • 31
    • 33746192198 scopus 로고    scopus 로고
    • A Graph-theoretic perspective on centrality
    • DOI 10.1016/j.socnet.2005.11.005, PII S0378873305000833
    • S. P. Borgattia and M. G. Everett, "A graph-theoretic perspective on centrality," Social Netw., vol. 28, no. 4, pp. 466-484, Oct. 2006. (Pubitemid 44089303)
    • (2006) Social Networks , vol.28 , Issue.4 , pp. 466-484
    • Borgatti, S.P.1    Everett, M.G.2
  • 33
    • 56349137799 scopus 로고    scopus 로고
    • Multimethodological approaches to network vulnerability analysis
    • A. T. Murray, T. C. Matisziw, and T. H. Grubesic, " Multimethodological approaches to network vulnerability analysis," Growth Change, vol. 39, no. 4, pp. 573-592, 2008.
    • (2008) Growth Change , vol.39 , Issue.4 , pp. 573-592
    • Murray, A.T.1    Matisziw, T.C.2    Grubesic, T.H.3
  • 34
    • 26044461304 scopus 로고    scopus 로고
    • Identifying critical infrastructure: The median and covering facility interdiction problems
    • DOI 10.1111/j.1467-8306.2004.00410.x
    • R. L. Church, M. P. Scaparra, and R. S. Middleton, "Identifying critical infrastructure the median and covering facility interdiction problems," Ann. Assoc. Amer. Geographers, vol. 94, no. 3, pp. 491-502, Sep. 2004. (Pubitemid 41716604)
    • (2004) Annals of the Association of American Geographers , vol.94 , Issue.3 , pp. 491-502
    • Church, R.L.1    Scaparra, M.P.2    Middleton, R.S.3
  • 35
    • 84883856631 scopus 로고    scopus 로고
    • Partitioning avoidance in mobile ad hoc networks using network survivability concepts
    • D. Goyal and J. J. Caffery, "Partitioning avoidance in mobile ad hoc networks using network survivability concepts," in Proc. 7th Int. Symp. Comput. Commun., 2002, pp. 553-558.
    • (2002) Proc. 7th Int. Symp. Comput. Commun , pp. 553-558
    • Goyal, D.1    Caffery, J.J.2
  • 36
    • 84881028021 scopus 로고    scopus 로고
    • Partition detection in mobile ad hoc networks using multiple disjoint paths set
    • Mahdia, Tunisia
    • M. Hauspie, J. Carle, and D. Simplot, "Partition detection in mobile ad hoc networks using multiple disjoint paths set," in Proc. 2nd IFIP MEDHOC- NET Workshop, Mahdia, Tunisia, 2003, pp. 25-27.
    • (2003) Proc. 2nd IFIP MEDHOC- NET Workshop , pp. 25-27
    • Hauspie, M.1    Carle, J.2    Simplot, D.3
  • 37
    • 37049017424 scopus 로고    scopus 로고
    • Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks
    • M. Jorgic, I. Stojmenovic, M. Hauspie, and D. Simplot-ryl, "Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks," in Proc. 3rd IFIP MED-HOC-NET Workshop, 2004, pp. 360-371.
    • (2004) Proc. 3rd IFIP MED-HOC-NET Workshop , pp. 360-371
    • Jorgic, M.1    Stojmenovic, I.2    Hauspie, M.3    Simplot-Ryl, D.4
  • 38
    • 77953295879 scopus 로고    scopus 로고
    • On approximation of new optimization methods for assessing network vulnerability
    • T. N. Dinh, Y. Xuan,M. T. Thai, E. K. Park, and T. Znati, "On approximation of new optimization methods for assessing network vulnerability," in Proc. INFOCOM, 2010, pp. 1-9.
    • (2010) Proc. INFOCOM , pp. 1-9
    • Dinh, T.N.1    Xuanm. T Thai, Y.2    Park, E.K.3    Znati, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.