메뉴 건너뛰기




Volumn , Issue , 2007, Pages 81-87

Utilizing behaviour history to fight malicious nodes in wireless Ad-hoc networks

Author keywords

Ad hoc networks; Malicious nodes; Network performance simulation; Packet loss; Performance analysis; Round trip delay; Throughput

Indexed keywords

INFORMATION MANAGEMENT; PACKET LOSS; PACKET NETWORKS; THROUGHPUT;

EID: 84905111755     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (19)
  • 4
    • 0034286541 scopus 로고    scopus 로고
    • Using Trust For Detecting Deceitful Agents In Artificial Societies
    • M. SCHILLO, "Using Trust For Detecting Deceitful Agents In Artificial Societies," Applied Artificial Intelligence, 2000, vol. 14, pp. 825-848.
    • (2000) Applied Artificial Intelligence , vol.14 , pp. 825-848
    • Schillo, M.1
  • 5
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, 2002, vol. 35 No.10, pp. 54-62.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 6
    • 0037003792 scopus 로고    scopus 로고
    • Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
    • V. Gupta, S. Krishnamurthy, and M. Faloutsos, "Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks," MILCOM, 2002, pp. 1118-1123.
    • (2002) MILCOM , pp. 1118-1123
    • Gupta, V.1    Krishnamurthy, S.2    Faloutsos, M.3
  • 8
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for Ad-hoc networks
    • Y. Hu, A. Perrig, and D. Johnson., "Ariadne: A secure on-demand routing protocol for Ad-hoc networks," Wireless Networks, 2005, vol. 11, pp. 21-38.
    • (2005) Wireless Networks , vol.11 , pp. 21-38
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 15
    • 4544235014 scopus 로고    scopus 로고
    • Stimulating Cooperative Behavior of Autonomous Devices - An Analysis of requirements and Existing Approaches
    • WIS2003), Angers, France April
    • P. Obreiter, B. Koenig-Ries, and M. Klein, "Stimulating Cooperative Behavior of Autonomous Devices - An Analysis of requirements and Existing Approaches", 2nd Int. Workshop on Wireless Information Systems (WIS2003), Angers, France April 2003.
    • (2003) 2nd Int. Workshop on Wireless Information Systems
    • Obreiter, P.1    Koenig-Ries, B.2    Klein, M.3
  • 17
    • 0003456435 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector (saodv) routing Internet Engineering Task Force (IETF) Draft
    • M. G. Zapata, Secure ad hoc on-demand distance vector (saodv) routing Internet Engineering Task Force (IETF) Draft, 2004.
    • (2004)
    • Zapata, M.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.