메뉴 건너뛰기




Volumn P 46, Issue , 2004, Pages 83-97

Sensors for detection of misbehaving nodes in MANETs

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVITY-BASED; CRITICAL PROBLEMS; DETECTION MECHANISM; MISBEHAVING NODES; MOBILE ADHOC NETWORK (MANETS); RELATED WORKS; SELFISH NODE; SIMULATION-BASED ANALYSIS;

EID: 84866538231     PISSN: 16175468     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (26)
  • 1
    • 0036986441 scopus 로고    scopus 로고
    • An on-demand secure routing protocol resilient to Byzantine failures
    • AHNRR02 und Atlanta, Georgia. September auch verfgbar unter
    • Awerbuch, B., Holmer, D., Nita-Rotaru, C., und Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe). Atlanta, Georgia. September 2002. auch verfgbar unter http://citeseer.nj.nec.com/article/awerbuch02demand.html.
    • (2002) ACM Workshop on Wireless Security (WiSe)
    • Awerbuch, B.1    Holmer, D.2    Nita-Rotaru, C.3    Rubens, H.4
  • 2
    • 0002380073 scopus 로고    scopus 로고
    • Tamper resistance - A cautionary note
    • AK96 und S. November auch verfgbar unter
    • Anderson, R. und Kuhn, M.: Tamper Resistance - a Cautionary Note. In: Proceedings of the Second Usenix Workshop on Electronic Commerce. S. 1-11. November 1996. auch verfgbar unter http://citeseer.nj.nec.com/article/anderson96tamper.html.
    • (1996) Proceedings of the Second Usenix Workshop on Electronic Commerce , pp. 1-11
    • Anderson, R.1    Kuhn, M.2
  • 4
    • 0037885580 scopus 로고    scopus 로고
    • Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
    • BB02a und S. Canary Islands, Spain. January IEEE Computer Society
    • Buchegger, S. und Boudec, J.-Y. L.: Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing. S. 403-410. Canary Islands, Spain. January 2002. IEEE Computer Society. http://citeseer.nj.nec.com/article/buchegger02nodes.html.
    • (2002) Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-Based Processing , pp. 403-410
    • Buchegger, S.1    Boudec, J.-Y.L.2
  • 7
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • BH03 und October
    • Buttyn, L. und Hubaux, J.-P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM/Kluwer Mobile Networks and Applications. 8(5). October 2003.
    • (2003) ACM/Kluwer Mobile Networks and Applications , vol.8 , Issue.5
    • Buttyn, L.1    Hubaux, J.-P.2
  • 9
    • 2442582716 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector routing
    • Gu02 July auch verfgbar unter
    • Guerrero Zapata, M.: Secure Ad hoc On-Demand Distance Vector Routing. ACM Mobile Computing and Communications Review (MC2R). 6(3):106-107. July 2002. auch verfgbar unter http://doi.acm.org/10.1145/581291.581312.
    • (2002) ACM Mobile Computing and Communications Review (MC2R) , vol.6 , Issue.3 , pp. 106-107
    • Guerrero Zapata, M.1
  • 10
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks
    • HPJ02 und Atlanta, Georgia, USA. September
    • Hu, Y.-C., Perrig, A., und Johnson, D. B.: Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks. In: Proceedings of MobiCom 2002. Atlanta, Georgia, USA. September 2002.
    • (2002) Proceedings of MobiCom 2002
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 12
    • 11844293124 scopus 로고    scopus 로고
    • Ka03 PhD thesis. University of Ulm. Ulm, Germany. also available as
    • Kargl, F.: Sicherheit in Mobilen Ad hoc Netzwerken. PhD thesis. University of Ulm. Ulm, Germany. 2003. also available as http://medien.informatik.uni-ulm.de/frank/research/dissertation.pdf.
    • (2003) Sicherheit in Mobilen Ad Hoc Netzwerken
    • Kargl, F.1
  • 13
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • MGLB00 und S. auch verfgbar unter
    • Marti, S., Giuli, T. J., Lai, K., und Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Mobile Computing and Networking. S. 255-265. 2000. auch verfgbar unter http://citeseer.nj.nec.com/marti00mitigating.html.
    • (2000) Mobile Computing and Networking , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 18
    • 1542451215 scopus 로고    scopus 로고
    • Secure routing for mobile ad hoc networks. Working session on security in wireless ad hoc networks, EPFL
    • PH02b und published in June
    • Papadimitratos, P. und Haas, Z. J. Secure Routing for Mobile Ad Hoc Networks. Working Session on Security in Wireless Ad Hoc Networks, EPFL, (published in Mobile Computing and Communications Review, vol.6, no.4). June 2002.
    • (2002) Mobile Computing and Communications Review , vol.6 , Issue.4
    • Papadimitratos, P.1    Haas, Z.J.2
  • 22
    • 0002670359 scopus 로고    scopus 로고
    • Modeling security threats
    • Sc99 December auch verfgbar unter
    • Schneier, B.: Modeling security threats. Dr Dobb's Journal. December 1999. auch verfgbar unter http://www.ddj.com/documents/s=896/ddj9912a/9912a.htm.
    • (1999) Dr Dobb's Journal
    • Schneier, B.1
  • 24
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • ZCY03 und San Francisco, CA. April
    • Zhong, S., Chen, J., und Yang, Y. R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE Infocom'03. San Francisco, CA. April 2003.
    • (2003) Proceedings of IEEE Infocom'03
    • Zhong, S.1    Chen, J.2    Yang, Y.R.3
  • 25
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • ZL00 und S. auch verfgbar unter
    • Zhang, Y. und Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Mobile Computing and Networking. S. 275-283. 2000. auch verfgbar unter http://citeseer.nj.nec.com/zhang00intrusion.html.
    • (2000) Mobile Computing and Networking , pp. 275-283
    • Zhang, Y.1    Lee, W.2
  • 26
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • ZLH03 und to appear in 9. auch verfgbar unter
    • Zhang, Y., Lee, W., und Huang, Y.-A.: Intrusion Detection Techniques for Mobile Wireless Networks. to appear in ACM Wireless Networks (WINET). 9. 2003. auch verfgbar unter http://www.wins.hrl.com/people/ygz/papers/winet03.pdf.
    • (2003) ACM Wireless Networks (WINET)
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.