메뉴 건너뛰기




Volumn 2, Issue 4, 2010, Pages 505-532

A survey on security in mobile peer-to-peer architectures— overlay-based vs. Underlay-based approaches

Author keywords

Mobile ad hoc network; Mobile peer to peer; Network security; Peer to peer

Indexed keywords

MOBILE SECURITY; PEER TO PEER NETWORKS; SURVEYS;

EID: 84861533295     PISSN: None     EISSN: 19995903     Source Type: Journal    
DOI: 10.3390/fi2040505     Document Type: Article
Times cited : (6)

References (49)
  • 3
    • 77951280603 scopus 로고    scopus 로고
    • (accessed on 29 September 2010)
    • Kirk, P. Gnutella—A Protocol for a Revolution, 2010. Available online: http://rfc-gnutella. sourceforge.net/(accessed on 29 September 2010).
    • (2010) Gnutella—A Protocol for a Revolution
    • Kirk, P.1
  • 4
    • 85109148523 scopus 로고    scopus 로고
    • Kazaa. Download KaZaA, (accessed on 29 September 2010)
    • Kazaa. Download KaZaA, 2010. Available online: www.kazaa.com/ (accessed on 29 September 2010).
    • (2010)
  • 6
    • 85109128734 scopus 로고    scopus 로고
    • Industrieanlagen-Betriebsgesellschaft mbH. (accessed on 29 September 2010)
    • Industrieanlagen-Betriebsgesellschaft mbH. IABG–InfoCom–HiMoNN—An efficient and highly mobile Ad-hoc Network Node, 2010. Available online: www.iabg.de/infokom/fachthemen/ himonn en.php (accessed on 29 September 2010).
    • (2010) IABG–InfoCom–HiMoNN—An efficient and highly mobile Ad-hoc Network Node
  • 8
    • 85109188019 scopus 로고    scopus 로고
    • CAR 2 CAR Communication Consortium. (accessed on 29 September 2010)
    • CAR 2 CAR Communication Consortium. Mission & Objective, 2010. Available online: www.car-to-car.org/ (accessed on 29 September 2010).
    • (2010) Mission & Objective
  • 24
    • 21644471550 scopus 로고    scopus 로고
    • Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
    • Tucson, AZ, USA, 6–10 December
    • Srivatsa, M.; Liu, L. Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis. In Proceedings of the 20th Annual Computer Security Applications Conference, Tucson, AZ, USA, 6–10 December 2004.
    • (2004) Proceedings of the 20th Annual Computer Security Applications Conference
    • Srivatsa, M.1    Liu, L.2
  • 34
    • 24144437206 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
    • Ning, P.; Sun, K. How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Netw. 2005, 3, 795–819.
    • (2005) Ad Hoc Netw , vol.3 , pp. 795-819
    • Ning, P.1    Sun, K.2
  • 41
    • 34548048170 scopus 로고    scopus 로고
    • Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
    • Kurosawa, S.; Nakayama, H.; Kato, N.; Jamalipour, A.; Nemoto, Y. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. Int. J. Netw. Secur. 2007, 5, 338–346.
    • (2007) Int. J. Netw. Secur , vol.5 , pp. 338-346
    • Kurosawa, S.1    Nakayama, H.2    Kato, N.3    Jamalipour, A.4    Nemoto, Y.5
  • 43
    • 78651538701 scopus 로고    scopus 로고
    • Reliable Routing against Selective Packet Drop Attack in DSR based MANET
    • Bhalaji, N.; Shanmugam, A. Reliable Routing against Selective Packet Drop Attack in DSR based MANET. J. Softw. 2009, 4, 536–543.
    • (2009) J. Softw , vol.4 , pp. 536-543
    • Bhalaji, N.1    Shanmugam, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.