메뉴 건너뛰기




Volumn , Issue , 2006, Pages 596-601

The impact of malicious nodes on the performance of wireless ad-hoc networks

Author keywords

Ad hoc networks; Malicious nodes; Network performance simulation; Packet loss; Performance analysis; Round trip delay; Throughput

Indexed keywords

INFORMATION MANAGEMENT; PACKET LOSS; PACKET NETWORKS; THROUGHPUT; WIRELESS AD HOC NETWORKS;

EID: 84905125680     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1)

References (18)
  • 1
    • 0041468485 scopus 로고    scopus 로고
    • Routing security and data confidentiality for mobile Ad-hoc networks
    • In, (VTC 2003-Spring)
    • K. S. Ng and W. K. G. Seah, "Routing security and data confidentiality for mobile Ad-hoc networks," In Proc. of the 57th IEEE Semiannual Vehicular Technology Conf. (VTC 2003-Spring), 2003, pp. 1821-1825 vol.3.
    • (2003) Proc. of the 57th IEEE Semiannual Vehicular Technology Conf , vol.3 , pp. 1821-1825
    • Ng, K.S.1    Seah, W.K.G.2
  • 3
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile Ad-hoc networks: challenges and solutions
    • H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in mobile Ad-hoc networks: challenges and solutions," Wireless Communications, IEEE, 2004, vol. 11, pp. 38-47.
    • (2004) Wireless Communications, IEEE , vol.11 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 4
    • 22944471143 scopus 로고    scopus 로고
    • Performance Evaluation and Simulation Verification for Wireless Ad-hoc Networks
    • H. Hallani and S. A. Shahrestani, "Performance Evaluation and Simulation Verification for Wireless Ad-hoc Networks," WSEAS Transactions on Communications, 2005, vol. 4, pp. 355-362.
    • (2005) WSEAS Transactions on Communications , vol.4 , pp. 355-362
    • Hallani, H.1    Shahrestani, S.A.2
  • 6
  • 7
    • 24744469215 scopus 로고    scopus 로고
    • A framework for key management in mobile Adhoc networks
    • In Proc. of the Int. Conf. on Information Technology: Coding and Computing, (ITCC 2005)
    • G. C. Hadjichristofi, W. J. Adams, and N. J. Davis, IV, "A framework for key management in mobile Adhoc networks," In Proc. of the Int. Conf. on Information Technology: Coding and Computing, (ITCC 2005), 2005, pp. 568-573 Vol. 2.
    • (2005) , vol.2 , pp. 568-573
    • Hadjichristofi, G.C.1    Adams, W.J.2    Davis Iv, N.J.3
  • 8
    • 33646552392 scopus 로고    scopus 로고
    • Secure Routing and Intrusion Detection in Ad-hoc Networks
    • In Proc. of the 3rd IEEE Int. Conf. on Pervasive Computing and Communications, (PerCom 2005)
    • A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad-hoc Networks," In Proc. of the 3rd IEEE Int. Conf. on Pervasive Computing and Communications, (PerCom 2005), 2005, pp. 191-199.
    • (2005) , pp. 191-199
    • Patwardhan, A.1    Parker, J.2    Joshi, A.3    Iorga, M.4    Karygiannis, T.5
  • 9
    • 0003582910 scopus 로고    scopus 로고
    • Ad-hoc Networking
    • Addison-Wesley
    • C. E. Perkins, "Ad-hoc Networking," Addison-Wesley, 2000.
    • (2000)
    • Perkins, C.E.1
  • 10
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for Ad-hoc networks
    • Wireless Networks
    • Y. Hu, A. Perrig, and D. Johnson., "Ariadne: A secure on-demand routing protocol for Ad-hoc networks," Wireless Networks, 2005, vol. 11, pp. 21-38.
    • (2005) , vol.11 , pp. 21-38
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 11
    • 21844459458 scopus 로고    scopus 로고
    • Ad-hoc Wireless Networks: Architectures and Protocols
    • First ed: Prentice Hall PTR
    • C. Siva Ram Murthy and B. S. Manoj, Ad-hoc Wireless Networks: Architectures and Protocols, First ed: Prentice Hall PTR, 2004.
    • (2004)
    • Siva Ram Murthy, C.1    Manoj, B.S.2
  • 12
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless Ad-hoc networks
    • IEEE [see also IEEE Personal Communications]
    • A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless Ad-hoc networks," Wireless Communications, IEEE [see also IEEE Personal Communications], 2004, vol. 11, pp. 48-60.
    • (2004) Wireless Communications , vol.11 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 13
    • 34347349933 scopus 로고    scopus 로고
    • Ad-hoc ondemand distance vector routing
    • In Proc. of the Mobile Computing Systems and Applications
    • C. E. Perkins and E. M. Royer, "Ad-hoc ondemand distance vector routing," In Proc. of the Mobile Computing Systems and Applications, 1999, pp. 90-100.
    • (1999) , pp. 90-100
    • Perkins, C.E.1    Royer, E.M.2
  • 14
    • 24144437206 scopus 로고    scopus 로고
    • How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
    • Ad Hoc Networks
    • P. Ning and K. Sun, "How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols," Ad Hoc Networks, 2005, vol. 3, pp. 795-819.
    • (2005) , vol.3 , pp. 795-819
    • Ning, P.1    Sun, K.2
  • 15
    • 84905093872 scopus 로고    scopus 로고
    • OPNET Modeler
    • OPNET Modeler, "http://www.opnet.com."
  • 16
    • 84948991468 scopus 로고    scopus 로고
    • A link adaptation scheme for improving throughput in the IEEE 802.11 wireless LAN
    • In Proc. of the 27th Annual IEEE Conf. on Local Computer Networks (LCN 2002)
    • S. Ci and H. Sharif, "A link adaptation scheme for improving throughput in the IEEE 802.11 wireless LAN," In Proc. of the 27th Annual IEEE Conf. on Local Computer Networks (LCN 2002). 2002, pp. 205-208.
    • (2002) , pp. 205-208
    • Ci, S.1    Sharif, H.2
  • 17
    • 0004220542 scopus 로고    scopus 로고
    • Computer Networks and Internets with Internet Applications
    • fourth edition). Upper Saddle River, NJ: Prentice Hall
    • D. Comer, Computer Networks and Internets with Internet Applications (fourth edition). Upper Saddle River, NJ: Prentice Hall, 2004.
    • (2004)
    • Comer, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.