메뉴 건너뛰기




Volumn , Issue , 2013, Pages 106-110

Distributed secure routing protocol for Mobile Ad-Hoc Networks

Author keywords

MANET; routing protocol; secure wireless networ

Indexed keywords

AD-HOC ROUTING PROTOCOL; CERTIFICATE AUTHORITY; MANET; MOBILE ADHOC NETWORK (MANETS); REACTIVE ROUTING PROTOCOL; SECURE ROUTING PROTOCOLS; SECURE WIRELESS NETWOR; ZONE ROUTING PROTOCOLS;

EID: 84884887905     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSIT.2013.6588766     Document Type: Conference Paper
Times cited : (5)

References (19)
  • 1
    • 84884822689 scopus 로고    scopus 로고
    • Ad-hoc protocol evaluation and experiences of real world ad-hoc networking
    • Uppsala University
    • D. Lundberg, "Ad-Hoc Protocol Evaluation And Experiences of Real World Ad-Hoc Networking," Department of IT, Uppsala University http://www. update. uu. se/~davidl/msthesis/thesis. pdf
    • Department of IT
    • Lundberg, D.1
  • 5
    • 34250683606 scopus 로고    scopus 로고
    • A survey on routing protocols in manets
    • Michigan State University, East Lansing, May 28
    • H. Zhou, "A Survey on Routing Protocols in MANETs", Department of Computer Science and Engineering, Michigan State University, East Lansing, May 28, 2003.
    • (2003) Department of Computer Science and Engineering
    • Zhou, H.1
  • 8
    • 70350068920 scopus 로고    scopus 로고
    • A survey of manet routing protocols in mobility models
    • M. K. Kumar and R. S. Rajesh, "A Survey of MANET Routing Protocols in Mobility Models," International Journal of Soft Computing Vol. 4, I. 3, pp. 136-141, 2009.
    • (2009) International Journal of Soft Computing , vol.4 , Issue.1-3 , pp. 136-141
    • Kumar, M.K.1    Rajesh, R.S.2
  • 10
    • 34547532527 scopus 로고    scopus 로고
    • A secure incentive protocol for mobile ad hoc networks
    • October
    • Y. Zhang, W. Louy, W. Liu and Y. Fang, "A Secure Incentive Protocol for Mobile Ad Hoc Networks," proc. of Journal on Wireless Networks, vol. 13, no. 5, pp. 569-582, October 2007.
    • (2007) Proc. of Journal on Wireless Networks , vol.13 , Issue.5 , pp. 569-582
    • Zhang, Y.1    Louy, W.2    Liu, W.3    Fang, Y.4
  • 11
    • 33947624156 scopus 로고    scopus 로고
    • An acknowledgment-based approach for the detection of routing misbehavior in manets
    • May
    • K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Trans. on Mobile Computing, vol. 6, no. 5, pp. 536-550, May 2007.
    • (2007) IEEE Trans. on Mobile Computing , vol.6 , Issue.5 , pp. 536-550
    • Liu, K.1    Deng, J.2    Varshney, P.K.3    Balakrishnan, K.4
  • 13
    • 85002271134 scopus 로고    scopus 로고
    • Secure and anonymous source routing protocol for wireless ad hoc networks
    • 56
    • L. XU and S. CHEN, "Secure and Anonymous Source Routing Protocol for Wireless Ad Hoc Networks," International Journal of Distributed Sensor Networks, Vol. 5, I. 56, pp. 1550-1477, 2009.
    • (2009) International Journal of Distributed Sensor Networks , vol.5 , Issue.1 , pp. 1550-1477
    • Xu, L.1    Chen, S.2
  • 18
    • 53549086979 scopus 로고    scopus 로고
    • Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping
    • 1, January
    • R. K. Panta, S. Bagchi and I. Khalil, "Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping," Ad Hoc Networks, Vol. 7, I. 1, January 2009, pp. 42-62.
    • (2009) Ad Hoc Networks , vol.7 , Issue.1 , pp. 42-62
    • Panta, R.K.1    Bagchi, S.2    Khalil, I.3
  • 19
    • 33845869923 scopus 로고    scopus 로고
    • Analysis and evaluation of SECOS, a protocol for energy efficient and secure communication in sensor networks
    • April
    • I. Khalil, S. Bagchi and N. B. Shroff, "Analysis and evaluation of SECOS, a protocol for energy efficient and secure communication in sensor networks," Ad Hoc Networks, Volume 5, Issue 3, pp. 360-391, April 2007.
    • (2007) Ad Hoc Networks , vol.5 , Issue.3 , pp. 360-391
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.