메뉴 건너뛰기




Volumn , Issue , 2004, Pages 435-456

Self-policing mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84877881947     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/9780203504086     Document Type: Chapter
Times cited : (4)

References (31)
  • 1
    • 4544308674 scopus 로고    scopus 로고
    • Observation-based cooperation enforcement in ad hoc networks
    • Sorav Bansal and Mary Baker. Observation-based cooperation enforcement in ad hoc networks. Technical Report, 2003.
    • (2003) Technical Report
    • Bansal, S.1    Baker, M.2
  • 2
    • 35248853957 scopus 로고    scopus 로고
    • IBM research report: The selfish node: Increasing routing security in mobile ad hoc networks
    • Sonja Buchegger and Jean-Yves Le Boudec. IBM Research Report: The selfish node: Increasing routing security in mobile ad hoc networks. RR 3354, 2001.
    • (2001) RR , pp. 3354
    • Buchegger, S.1    Boudec, J.-Y.L.2
  • 3
    • 0037885580 scopus 로고    scopus 로고
    • Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
    • Canary Islands, Spain. January 2002. Piscataway, NJ: IEEE Computer Society
    • Sonja Buchegger and Jean-Yves Le Boudec. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In Proceedings of the 10th Euromicro Workshop on Parallel, Distributed, and Network-Based Processing, pp. 403–410, Canary Islands, Spain. January 2002. Piscataway, NJ: IEEE Computer Society, 2002.
    • (2002) Proceedings of the 10th Euromicro Workshop on Parallel, Distributed, and Network-Based Processing , pp. 403-410
    • Buchegger, S.1    Boudec, J.-Y.L.2
  • 4
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the confidant protocol: Cooperation of nodes — fairness in dynamic ad hoc networks
    • Lausanne, Switzerland, June 2002. Piscataway, NJ: IEEE Computer Society
    • Sonja Buchegger and Jean-Yves Le Boudec. Performance analysis of the CONFIDANT protocol: Cooperation of nodes — Fairness in dynamic ad hoc networks. In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, Switzerland, June 2002. Piscataway, NJ: IEEE Computer Society, 2002.
    • (2002) Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)
    • Buchegger, S.1    Boudec, J.-Y.L.2
  • 8
    • 84871044906 scopus 로고    scopus 로고
    • Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
    • Chrysanthos Dellarocas. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proceedings of the ACM Conference on Electronic Commerce, pp. 150–157, 2000.
    • (2000) Proceedings of the ACM Conference on Electronic Commerce , pp. 150-157
    • Dellarocas, C.1
  • 13
    • 0023139974 scopus 로고
    • The DARPA packet radio network protocols
    • no. 1, January
    • John Jubin and Janet D. Tomow. The DARPA packet radio network protocols. In Proceedings of the IEEE, vol. 75, no. 1, pp. 21–32, January 1987.
    • (1987) Proceedings of the IEEE , Issue.75 , pp. 21-32
    • Jubin, J.1    Tomow, J.D.2
  • 14
    • 84900044615 scopus 로고    scopus 로고
    • The production of trust in online markets
    • E.J. Lawler, M. Macy, S. Thyne, and H.A. Walker, Greenwich, CT
    • Peter Kollock. The production of trust in online markets. In Advances in Group Processes, E.J. Lawler, M. Macy, S. Thyne, and H.A. Walker, Eds., Greenwich, CT, 1999.
    • (1999) Advances in Group Processes
    • Kollock, P.1
  • 15
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MobiCom 2000, pp. 255–265, 2000.
    • (2000) Proceedings of MobiCom 2000 , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 18
    • 1642324009 scopus 로고    scopus 로고
    • Statistically unique and cryptographically verifiable (sucv) identifiers and addresses
    • February
    • G. Montenegro and C. Castelluccia. Statistically unique and cryptographically verifiable (sucv) identifiers and addresses. In Proceeding of NDSS’02, February 2002.
    • (2002) Proceeding of NDSS’02
    • Montenegro, G.1    Castelluccia, C.2
  • 19
    • 84903836776 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
    • West Point, June
    • Peng Ning and Kun Sun. How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. In Proceedings of the 4th Annual IEEE Information Assurance Workshop, West Point, June 2003.
    • (2003) Proceedings of the 4th Annual IEEE Information Assurance Workshop
    • Ning, P.1    Sun, K.2
  • 20
    • 21644475636 scopus 로고    scopus 로고
    • Context aware inferencing to rate a selfish node in dsr based ad-hoc networks
    • Taipeh, Taiwan
    • Krishna Paul and Dirk Westhoff. Context aware inferencing to rate a selfish node in DSR based ad-hoc networks. In Proceedings of the IEEE Globecom Conference, Taipeh, Taiwan, 2002.
    • (2002) Proceedings of the IEEE Globecom Conference
    • Paul, K.1    Westhoff, D.2
  • 21
    • 4544384608 scopus 로고    scopus 로고
    • Ad hoc on demand distance vector (AODV) routing
    • July
    • Charles E. Perkins, Elizabeth M. Royer, and Santanu Das. Ad hoc on demand distance vector (AODV) routing. RFC 3561, IETF, July 2003.
    • (2003) RFC 3561, IETF
    • Perkins, C.E.1    Royer, E.M.2    Das, S.3
  • 23
    • 0031078841 scopus 로고    scopus 로고
    • Trusting mobile user devices and security modules
    • February
    • Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, and Michael Waidner. Trusting mobile user devices and security modules. IEEE Computer, pp. 61–68, February 1997.
    • (1997) IEEE Computer , pp. 61-68
    • Pfitzmann, A.1    Pfitzmann, B.2    Schunter, M.3    Waidner, M.4
  • 30
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • Yongguang Zhang and Wenke Lee. Intrusion detection in wireless ad-hoc networks. In Proceedings of MobiCom 2000, pp. 275–283, 2000.
    • (2000) Proceedings of Mobicom 2000 , pp. 275-283
    • Zhang, Y.1    Lee, W.2
  • 31
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks
    • S. Zhong, Y. Yang, and J. Chen. Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks. In Proceedings of Infocom, 2003.
    • (2003) Proceedings of Infocom
    • Zhong, S.1    Yang, Y.2    Chen, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.