메뉴 건너뛰기




Volumn 2013, Issue , 2013, Pages

A credible routing based on a novel trust mechanism in Ad Hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

AVERAGE END-TO-END DELAYS; BETTER PERFORMANCE; D S EVIDENCE THEORY; MALICIOUS NODES; MOBILE ADHOC NETWORK (MANETS); NEIGHBOUR NODES; PACKET DELIVERY RATIO; ROUTING DECISIONS;

EID: 84877998022     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2013/652051     Document Type: Article
Times cited : (25)

References (22)
  • 1
    • 80053572205 scopus 로고    scopus 로고
    • Trustbased trustbased minimum cost opportunistic routing for Ad Hoc networks
    • Wang B., Huang C. H., Li L. Y., Yang W. Z., Trustbased trustbased minimum cost opportunistic routing for Ad Hoc networks. Journal of Systems and Software 2011 84 12 2107 2122
    • (2011) Journal of Systems and Software , vol.84 , Issue.12 , pp. 2107-2122
    • Wang, B.1    Huang, C.H.2    Li, L.Y.3    Yang, W.Z.4
  • 3
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in Ad Hoc wireless networks
    • Johnson D. B., Maltz D. A., Dynamic source routing in Ad Hoc wireless networks. Mobile Computing 1996 353 153 181
    • (1996) Mobile Computing , vol.353 , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 7
    • 63149130883 scopus 로고    scopus 로고
    • Voting-based clustering algorithm with subjective trust and stability in mobile Ad-Hoc networks
    • December 2008 Shanghai, China 2-s2.0-63149130883 10.1109/EUC.2008.93
    • Peng S. C., Jia W. J., Wang G. J., Voting-based clustering algorithm with subjective trust and stability in mobile Ad-Hoc networks. 2 Proceedings of the 5th International Conference on Embedded and Ubiquitous Computing (EUC '08) December 2008 Shanghai, China 3 9 2-s2.0-63149130883 10.1109/EUC.2008.93
    • Proceedings of the 5th International Conference on Embedded and Ubiquitous Computing (EUC '08) , vol.2 , pp. 3-9
    • Peng, S.C.1    Jia, W.J.2    Wang, G.J.3
  • 8
    • 64049107478 scopus 로고    scopus 로고
    • E-hermes: A robust cooperative trust establishment scheme for mobile Ad Hoc networks
    • 2-s2.0-64049107478 10.1016/j.adhoc.2008.10.003
    • Zouridaki C., Mark B. L., Hejmo M., Thomas R. K., E-hermes: a robust cooperative trust establishment scheme for mobile Ad Hoc networks. Ad Hoc Networks 2009 7 6 1156 1168 2-s2.0-64049107478 10.1016/j.adhoc.2008.10.003
    • (2009) Ad Hoc Networks , vol.7 , Issue.6 , pp. 1156-1168
    • Zouridaki, C.1    Mark, B.L.2    Hejmo, M.3    Thomas, R.K.4
  • 9
    • 63049099708 scopus 로고    scopus 로고
    • Reliable and fully distributed trust model for mobile Ad Hoc networks
    • 2-s2.0-63049099708 10.1016/j.cose.2008.11.009
    • Omar M., Challal Y., Bouabdallah A., Reliable and fully distributed trust model for mobile Ad Hoc networks. Computers and Security 2009 28 3-4 199 214 2-s2.0-63049099708 10.1016/j.cose.2008.11.009
    • (2009) Computers and Security , vol.28 , Issue.3-4 , pp. 199-214
    • Omar, M.1    Challal, Y.2    Bouabdallah, A.3
  • 11
    • 76449102186 scopus 로고    scopus 로고
    • A trust model based on evidence theory for P2P systems
    • 2-s2.0-76449102186
    • Huang L. D., Xue G., He X. L., Zhuang H. L., A trust model based on evidence theory for P2P systems. Applied Mechanics and Materials 2010 20 23 99 104 2-s2.0-76449102186
    • (2010) Applied Mechanics and Materials , vol.20 , Issue.23 , pp. 99-104
    • Huang, L.D.1    Xue, G.2    He, X.L.3    Zhuang, H.L.4
  • 12
  • 13
    • 0000516376 scopus 로고
    • Upper and lower probabilities induced by a multi-valued mapping
    • Dempster A. P., Upper and lower probabilities induced by a multi-valued mapping. The Annals of Mathematical Statistics 1967 38 2 325 339
    • (1967) The Annals of Mathematical Statistics , vol.38 , Issue.2 , pp. 325-339
    • Dempster, A.P.1
  • 15
    • 80051982332 scopus 로고    scopus 로고
    • Improved secure trust-based location-aided routing model for MANETs
    • Wang K., Wu M., Improved secure trust-based location-aided routing model for MANETs. China Communications 2011 8 3 154 162
    • (2011) China Communications , vol.8 , Issue.3 , pp. 154-162
    • Wang, K.1    Wu, M.2
  • 16
    • 78650394299 scopus 로고    scopus 로고
    • Trust-based on-demand multipath routing in mobile Ad Hoc networks
    • 2-s2.0-78650394299 10.1049/iet-ifs.2009.0140
    • Li X., Jia Z. P., Zhang P., Wang H. Y., Trust-based on-demand multipath routing in mobile Ad Hoc networks. IET Information Security 2010 4 4 212 232 2-s2.0-78650394299 10.1049/iet-ifs.2009.0140
    • (2010) IET Information Security , vol.4 , Issue.4 , pp. 212-232
    • Li, X.1    Jia, Z.P.2    Zhang, P.3    Wang, H.Y.4
  • 17
    • 77950193796 scopus 로고    scopus 로고
    • Trusted routing based on dynamic trust mechanism in mobile Ad-Hoc networks
    • 2-s2.0-77950193796 10.1587/transinf.E93.D.510 500
    • Peng S. C., Jia W. J., Wang G. J., Wu J., Guo M. Y., Trusted routing based on dynamic trust mechanism in mobile Ad-Hoc networks. IEICE Transactions on Information and Systems 2010 E93.D 3 510 517 2-s2.0-77950193796 10.1587/transinf.E93.D.510
    • (2010) IEICE Transactions on Information and Systems , vol.E93 , Issue.3 , pp. 510-517
    • Peng, S.C.1    Jia, W.J.2    Wang, G.J.3    Wu, J.4    Guo, M.Y.5
  • 18
    • 39049100803 scopus 로고    scopus 로고
    • Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
    • DOI 10.1016/j.comcom.2007.10.021, PII S0140366407004276
    • Narula P., Dhurandher S. K., Misra S., Woungang I., Security in mobile Ad-Hoc networks using soft encryption and trust-based multi-path routing. Computer Communications 2008 31 4 760 769 2-s2.0-39049100803 10.1016/j.comcom.2007.10.021 (Pubitemid 351248943)
    • (2008) Computer Communications , vol.31 , Issue.4 , pp. 760-769
    • Narula, P.1    Dhurandher, S.K.2    Misra, S.3    Woungang, I.4
  • 19
    • 84856812343 scopus 로고    scopus 로고
    • Evaluating trust in Ad Hoc network routing by induction of decision trees
    • Sirotheau S. L. F., Sousa R. T. D., Evaluating trust in Ad Hoc network routing by induction of decision trees. IEEE Latin America Transactions 2012 10 1 1332 1343
    • (2012) IEEE Latin America Transactions , vol.10 , Issue.1 , pp. 1332-1343
    • Sirotheau, S.L.F.1    Sousa, R.T.D.2
  • 20
    • 33646410469 scopus 로고    scopus 로고
    • Performance comparison of trust-based reactive routing protocols
    • 2-s2.0-33646410469 10.1109/TMC.2006.83
    • Pirzada A. A., McDonald C., Datta A., Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing 2006 5 6 695 710 2-s2.0-33646410469 10.1109/TMC.2006.83
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.6 , pp. 695-710
    • Pirzada, A.A.1    McDonald, C.2    Datta, A.3
  • 21
    • 0010623928 scopus 로고    scopus 로고
    • A new distance between two bodies of evidence
    • DOI 10.1016/S1566-2535(01)00026-4, PII S1566253501000264
    • Jousselme A. L., Grenier D., Bosse E., A new distance between two bodies of evidence. Information Fusion 2001 2 2 91 101 2-s2.0-0010623928 10.1016/S1566-2535(01)00026-4 (Pubitemid 33632552)
    • (2001) Information Fusion , vol.2 , Issue.2 , pp. 91-101
    • Jousselme, A.-L.1    Grenier, D.2    Bosse, E.3
  • 22


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.