메뉴 건너뛰기




Volumn 32, Issue 5, 2011, Pages

Trusted routing based on D-S evidence theory in wireless mesh network

Author keywords

Dempster Shafer evidence theory; OPNET simulation; Trust evaluation model; Wireless mesh network

Indexed keywords

D S EVIDENCE THEORY; DEMPSTER SHAFER EVIDENCE THEORY; MALICIOUS NODES; OPNET SIMULATION; ROUTINGS; SIMULATION RESULT; TRUST EVALUATION; WIRELESS MESH;

EID: 79959302953     PISSN: 1000436X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (25)
  • 2
    • 27844590384 scopus 로고    scopus 로고
    • Wireless mesh networks: A survey
    • AKYILDIX I F, WANG X, WANG X, et al. Wireless mesh networks: a survey[J]. Computer Networks, 2005, 43(9): 23-30.
    • (2005) Computer Networks , vol.43 , Issue.9 , pp. 23-30
    • Akyildix, I.F.1    Wang, X.2    Wang, X.3
  • 3
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • HU Y C, PERRIG A. A survey of secure wireless ad hoc routing[J]. IEEE Security and Privacy, 2004, 2(3): 28-39.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.C.1    Perrig, A.2
  • 11
    • 77953999875 scopus 로고    scopus 로고
    • Trust management model based on reputation of nodes for P2P network
    • LU S F, LIU F, HU H P, et al. Trust management model based on reputation of nodes for P2P network[J]. Journal of Chinese Computer Systems, 2009, 30(11): 2139-2145.
    • (2009) Journal of Chinese Computer Systems , vol.30 , Issue.11 , pp. 2139-2145
    • Lu, S.F.1    Liu, F.2    Hu, H.P.3
  • 12
    • 56749140937 scopus 로고    scopus 로고
    • Defense of trust management vulnerabilities in distributed networks
    • YAN S, ZHU H, LIU K J R. Defense of trust management vulnerabilities in distributed networks[J]. IEEE Communications Magazine, 2008, 46(2): 112-119.
    • (2008) IEEE Communications Magazine , vol.46 , Issue.2 , pp. 112-119
    • Yan, S.1    Zhu, H.2    Liu, K.J.R.3
  • 13
    • 77953965900 scopus 로고    scopus 로고
    • Trustworthy global reputation model in peer-to-peer networks
    • WANG K, WU M. Trustworthy global reputation model in peer-to-peer networks[J]. Journal of Applied Sciences, 2010, 28(3): 237-245.
    • (2010) Journal of Applied Sciences , vol.28 , Issue.3 , pp. 237-245
    • Wang, K.1    Wu, M.2
  • 14
    • 0000516376 scopus 로고
    • Upper and lower probabilities induced by multi-valued mapping
    • DEMPSTER A. Upper and lower probabilities induced by multi-valued mapping[J]. Annals of Mathematical Statistic, 1967, 38: 325-339.
    • (1967) Annals of Mathematical Statistic , vol.38 , pp. 325-339
    • Dempster, A.1
  • 18
    • 48549088586 scopus 로고    scopus 로고
    • Trust management in wireless sensor networks
    • JING Q, TANG L Y, CHEN Z. Trust management in wireless sensor networks[J]. Journal of Software, 2008, 19 (7): 1716-1730.
    • (2008) Journal of Software , vol.19 , Issue.7 , pp. 1716-1730
    • Jing, Q.1    Tang, L.Y.2    Chen, Z.3
  • 19
    • 0022733771 scopus 로고
    • A simple view of the dempster-shafer theory of evidence and its implication for the rule of combination
    • ZADEH L A. A simple view of the dempster-shafer theory of evidence and its implication for the rule of combination[J]. AI Magazine, 1986, 7: 85-90.
    • (1986) AI Magazine , vol.7 , pp. 85-90
    • Zadeh, L.A.1
  • 20
    • 0033728781 scopus 로고    scopus 로고
    • Combining belief functions when evidence conflicts
    • MURPHY C K. Combining belief functions when evidence conflicts[J]. Decision Support Systems, 2000, 29: 1-9.
    • (2000) Decision Support Systems , vol.29 , pp. 1-9
    • Murphy, C.K.1
  • 22
    • 65349107884 scopus 로고    scopus 로고
    • An improved method of D-S evidential reasoning
    • CHEN Y L, WANG J J. An improved method of D-S evidential reasoning[J]. Journal of System Simulation, 2004, 16(1): 28-30.
    • (2004) Journal of System Simulation , vol.16 , Issue.1 , pp. 28-30
    • Chen, Y.L.1    Wang, J.J.2
  • 23
    • 0003843664 scopus 로고    scopus 로고
    • Ad-hoc on-demanding distance vector (AODV) routing
    • IETF RFC 3591
    • PERKINS C, BELDING R E, DAS S. Ad-hoc on-Demanding Distance Vector (AODV) Routing[S]. IETF RFC 3591, 2003.
    • (2003)
    • Perkins, C.1    Belding, R.E.2    Das, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.