메뉴 건너뛰기




Volumn 11, Issue 7, 2013, Pages 2096-2114

Trust prediction and trust-based source routing in mobile ad hoc networks

Author keywords

Ad hoc; Malicious node; Security requirement; Source routing; Trust prediction

Indexed keywords

AD HOC; MALICIOUS NODES; SECURITY REQUIREMENTS; SOURCE ROUTING; TRUST PREDICTIONS;

EID: 84883463898     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2012.02.009     Document Type: Article
Times cited : (192)

References (35)
  • 7
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Y.L. Sun, W. Yu, Z. Han, and K.J. Ray Liu Information theoretic framework of trust modeling and evaluation for ad hoc networks IEEE Journal on Selected Areas in Communications 24 2 2006 305 319
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 305-319
    • Sun, Y.L.1    Yu, W.2    Han, Z.3    Ray Liu, K.J.4
  • 9
    • 77950910834 scopus 로고    scopus 로고
    • A subjective trust management model based on certainty-factor for MANETs
    • J. Luo, and M. Fan A subjective trust management model based on certainty-factor for MANETs Chinese Journal of Computer Research and Development 47 3 2010 515 523
    • (2010) Chinese Journal of Computer Research and Development , vol.47 , Issue.3 , pp. 515-523
    • Luo, J.1    Fan, M.2
  • 11
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad hoc mobile wireless networks
    • E.M. Royer, and C.K. Toh A review of current routing protocols for ad hoc mobile wireless networks IEEE Personal Comminations Magazine 6 2 1999 46 55
    • (1999) IEEE Personal Comminations Magazine , vol.6 , Issue.2 , pp. 46-55
    • Royer, E.M.1    Toh, C.K.2
  • 12
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • I. Tomasz, K. Hank, first ed. Kluwer Academic Press
    • D. Johnson, and D. Maltz Dynamic source routing in ad hoc wireless networks I. Tomasz, K. Hank, Mobile Computing first ed. 1996 Kluwer Academic Press 153 181
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.1    Maltz, D.2
  • 24
    • 72949113634 scopus 로고    scopus 로고
    • A distributed intrusion detection system for resource-constrained devices in ad-hoc networks
    • A.P. Lauf, R.A. Peters, and W.H. Robinson A distributed intrusion detection system for resource-constrained devices in ad-hoc networks Ad Hoc Networks 8 3 2010 253 266
    • (2010) Ad Hoc Networks , vol.8 , Issue.3 , pp. 253-266
    • Lauf, A.P.1    Peters, R.A.2    Robinson, W.H.3
  • 25
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc net-works
    • L. Buttyan, and J.P. Hubaux Stimulating cooperation in self-organizing mobile ad hoc net-works ACM/Kluwer Mobile Networks and Applications 8 5 2003 73 80
    • (2003) ACM/Kluwer Mobile Networks and Applications , vol.8 , Issue.5 , pp. 73-80
    • Buttyan, L.1    Hubaux, J.P.2
  • 27
    • 82455219325 scopus 로고    scopus 로고
    • Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory
    • H. Xia, Z. Jia, L. Ju, and Y. Zhu Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory IET Wireless Sensor Systems 1 4 2011 248 266
    • (2011) IET Wireless Sensor Systems , vol.1 , Issue.4 , pp. 248-266
    • Xia, H.1    Jia, Z.2    Ju, L.3    Zhu, Y.4
  • 29
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Y. Sun, W. Yu, Z. Han, and K.J.R. Liu Information theoretic framework of trust modeling and evaluation for ad hoc networks IEEE Journal on Selected Areas in Communications 24 2 2006 305 317
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.1    Yu, W.2    Han, Z.3    Liu, K.J.R.4
  • 31
    • 79956203877 scopus 로고    scopus 로고
    • Reliable routing in ad hoc networks using direct trust mechanisms
    • X.Y. Cheng, D.Y. Li, first ed. Springer Press
    • A.A. Pirzada, and C. McDonald Reliable routing in ad hoc networks using direct trust mechanisms X.Y. Cheng, D.Y. Li, Advances in Ad Hoc and Sensor Networks first ed. 2006 Springer Press 122 160
    • (2006) Advances in Ad Hoc and Sensor Networks , pp. 122-160
    • Pirzada, A.A.1    McDonald, C.2
  • 32
    • 84883448659 scopus 로고    scopus 로고
    • (accessed September, 2009)
    • < http://www.isi.edu/nsnam/ns/ > (accessed September, 2009).
  • 34
    • 82455165560 scopus 로고    scopus 로고
    • The medium access control sublayer
    • A.S. Tanenbaum, fourth ed. Prentice Hall Press
    • A.S. Tanenbaum The medium access control sublayer A.S. Tanenbaum, Computer Networks fourth ed. 2002 Prentice Hall Press 251 270
    • (2002) Computer Networks , pp. 251-270
    • Tanenbaum, A.S.1
  • 35
    • 3042802118 scopus 로고    scopus 로고
    • The node distribution of the random waypoint mobility model for wireless ad hoc networks
    • C. Bettstetter, G. Resta, and P. Santi The node distribution of the random waypoint mobility model for wireless ad hoc networks IEEE Transactions on Mobile Computing 2 3 2003 257 269
    • (2003) IEEE Transactions on Mobile Computing , vol.2 , Issue.3 , pp. 257-269
    • Bettstetter, C.1    Resta, G.2    Santi, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.