메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Message security in multi-path ad hoc networks using a neural network-based cipher

Author keywords

DSR; mobile ad hoc networks; multi path routing; Neural networks; security; symmetric block cipher; trust

Indexed keywords

DSR; MOBILE AD HOC; MULTI PATH ROUTING; SECURITY; SYMMETRIC BLOCK CIPHERS; TRUST;

EID: 84863178488     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2011.6133519     Document Type: Conference Paper
Times cited : (10)

References (22)
  • 1
    • 0009788067 scopus 로고    scopus 로고
    • Mobile Ad Hoch Networks and Routing Protocols
    • Chapter 17, I. Stojmenovic (Eds.), ISBN:0-471-41902, John Wiley & Sons, Inc.
    • Y-C. Tseng, W-H. Liao, S-L. Wu, "Mobile Ad Hoch Networks and Routing Protocols", Chapter 17, Handbook of Wireless Networks ad Mobile Computing, I. Stojmenovic (Eds.), ISBN:0-471-41902, John Wiley & Sons, Inc., pp. 371-392, 2002.
    • (2002) Handbook of Wireless Networks Ad Mobile Computing , pp. 371-392
    • Tseng, Y.-C.1    Liao, W.-H.2    Wu, S.-L.3
  • 2
    • 84863149546 scopus 로고    scopus 로고
    • Credit-based Cooperation Enforcement Schemes Tailored to Opportunistic Networks
    • Chapter 3 in: M. Denko et al. (Eds.), Auerbach Publications, Taylor & Francis Group, Boca Raton, Florida, To appear
    • I. Woungang, M. K. Denko, "Credit-based Cooperation Enforcement Schemes Tailored to Opportunistic Networks", Chapter 3 in: M. Denko et al. (Eds.), Mobile Opportunistic Networks: Architectures, Protocols and Applications, Auerbach Publications, Taylor & Francis Group, Boca Raton, Florida, To appear 2011.
    • (2011) Mobile Opportunistic Networks: Architectures, Protocols and Applications
    • Woungang, I.1    Denko, M.K.2
  • 4
    • 71649094416 scopus 로고    scopus 로고
    • A Survey of Attack and Defense Techniques for Reputation Systems
    • Dec.
    • K. Hoffman, D. Zage, and C. Nita-Rotaru, "A Survey of Attack and Defense Techniques for Reputation Systems", ACM Computing Surveys, vol. 42, Issue 1, Dec. 2009
    • (2009) ACM Computing Surveys , vol.42 , Issue.1
    • Hoffman, K.1    Zage, D.2    Nita-Rotaru, C.3
  • 5
    • 77951277642 scopus 로고    scopus 로고
    • CompactPSH: An Efficient Transitive TFT Incentive Scheme for Peer-to-Peer Networks
    • M. Younis, C. Chun Tung, Zurich, Switzerland
    • T. Bocek, Y. El-khatib, F. Victora Hecht, D. Hausheer,A.Stiller, "CompactPSH: An Efficient Transitive TFT Incentive Scheme for Peer-to-Peer Networks", In: M. Younis, C. Chun Tung, Local Computer Networks, Zurich, Switzerland, pp. 483-490, 2009.
    • (2009) Local Computer Networks , pp. 483-490
    • Bocek, T.1    El-khatib, Y.2    Victora Hecht, F.3    Hausheer, D.4    Stiller, A.5
  • 7
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • DOI 10.1007/s11276-004-4744-y
    • Y. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks", Wireless Networks, Vol. 11, Issue 1-2, pp. 21-38, Jan. 2005. (Pubitemid 40536374)
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 8
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • August
    • S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks", in Proc. of MobiCom 2000, Boston, pp. 255-265, August 2000.
    • (2000) Proc. of MobiCom 2000, Boston , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 11
    • 39049100803 scopus 로고    scopus 로고
    • Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
    • DOI 10.1016/j.comcom.2007.10.021, PII S0140366407004276
    • P. Narula, S. K. Dhurandher, S. Misra, I. Woungang, "Security in mobile ad-hoc networks using soft encryption and trust based multipath routing", Computer Communications, Vol. 31, pp. 760-769, 2008. (Pubitemid 351248943)
    • (2008) Computer Communications , vol.31 , Issue.4 , pp. 760-769
    • Narula, P.1    Dhurandher, S.K.2    Misra, S.3    Woungang, I.4
  • 14
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic Source Routing in ad hoc wireless networks
    • T. Imielinski, H. Korth (Eds.), Book Chapter Kluwer Academic Publishers, Dordrecht, Netherlands
    • D. Johnson, D. Maltz, "Dynamic Source Routing in ad hoc wireless networks", in T. Imielinski, H. Korth (Eds.), Book Chapter in Mobile Computing, Kluwer Academic Publishers, Dordrecht, Netherlands, pp. 131-181, 1996.
    • (1996) Mobile Computing , pp. 131-181
    • Johnson, D.1    Maltz, D.2
  • 15
    • 13844250146 scopus 로고    scopus 로고
    • Last visited Dec 3, 2010
    • QualNet Simulator, http://www.scalable-networks.com/ (Last visited Dec 3, 2010).
    • QualNet Simulator
  • 16
    • 84863155532 scopus 로고    scopus 로고
    • SMART: A Secure Multi-Layer Credit Based Incentive Scheme for Delay-Tolerant Networks
    • To appear
    • H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, "SMART: A Secure Multi-Layer Credit Based Incentive Scheme for Delay-Tolerant Networks", To appear in IEEE Transactions on Vehicular Technology, 2010
    • (2010) IEEE Transactions on Vehicular Technology
    • Zhu, H.1    Lin, X.2    Lu, R.3    Fan, Y.4    Shen, X.5
  • 17
    • 67349189496 scopus 로고    scopus 로고
    • A Secure Credit - Based Cooperation Stimulating Mechanism for MANETs Using Hash Chains
    • Sept.
    • H. Janzadeh, K. Fayazbakhsh, M. Dehghan, M. S. Fallah, "A Secure Credit - Based Cooperation Stimulating Mechanism for MANETs Using Hash Chains", In Future Generation Computer Systems, vol. 25, Issue 8, Sept., pp. 926-934, 2009.
    • (2009) Future Generation Computer Systems , vol.25 , Issue.8 , pp. 926-934
    • Janzadeh, H.1    Fayazbakhsh, K.2    Dehghan, M.3    Fallah, M.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.