메뉴 건너뛰기




Volumn 45, Issue , 2014, Pages 215-227

A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications

Author keywords

Collaborative services; Internal attacks; Internet of Things; Trust; Trust management

Indexed keywords

WIRELESS AD HOC NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84906813967     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2014.07.036     Document Type: Article
Times cited : (4)

References (96)
  • 1
    • 77953146565 scopus 로고    scopus 로고
    • Path diminution in node-disjoint multipath routing for mobile ad hoc networks is unavoidable with single route discovery
    • A.M. Abbas, and B.N. Jain Path diminution in node-disjoint multipath routing for mobile ad hoc networks is unavoidable with single route discovery Int J Ad Hoc Ubiquitous Comput 5 1 2010 7 21
    • (2010) Int J Ad Hoc Ubiquitous Comput , vol.5 , Issue.1 , pp. 7-21
    • Abbas, A.M.1    Jain, B.N.2
  • 2
    • 34250344419 scopus 로고    scopus 로고
    • Optimum power allocation in cooperative networks
    • photonics, communications and networks, and computing science; March-April
    • Adeane, J, Rodrigues, MRD, Wassell, IJ. Optimum power allocation in cooperative networks. In: Proceedings of the postgraduate research conference in electronics, photonics, communications and networks, and computing science; March-April 2005. p. 23-4.
    • (2005) Proceedings of the Postgraduate Research Conference in Electronics , pp. 23-24
    • Adeane, J.1    Mrd, R.2    Wassell, I.J.3
  • 5
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • L. Atzori, A. Iera, and G. Morabito The internet of things: a survey Comput Netw 54 15 2010 2787 2805
    • (2010) Comput Netw , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 6
    • 0027693935 scopus 로고
    • Diversity coding for transparent self-healing and fault-tolerant communication networks
    • E. Ayanoglu et al. Diversity coding for transparent self-healing and fault-tolerant communication networks IEEE Trans Commun 41 11 1993 1677 1686
    • (1993) IEEE Trans Commun , vol.41 , Issue.11 , pp. 1677-1686
    • Ayanoglu, E.1
  • 14
    • 33644986718 scopus 로고    scopus 로고
    • A simple cooperative diversity method based on network path selection
    • A. Bletsas, A. Khisti, D.P. Reed, and A. Lippman A simple cooperative diversity method based on network path selection IEEE J Sel Areas Commun 24 2006 659
    • (2006) IEEE J Sel Areas Commun , vol.24 , pp. 659
    • Bletsas, A.1    Khisti, A.2    Reed, D.P.3    Lippman, A.4
  • 16
    • 14844324732 scopus 로고    scopus 로고
    • A robust reputation system for peer-to-peer and mobile ad-hoc networks
    • Cambridge MA, USA: Harvard University; June
    • Buchegger, S, Le Boudec, J-Y. A robust reputation system for peer-to-peer and mobile ad-hoc networks. In: Proceedings of P2PEcon 2004. Cambridge MA, USA: Harvard University; June 2004.
    • (2004) Proceedings of P2PEcon 2004
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 19
    • 84866346403 scopus 로고    scopus 로고
    • TRM-IoT: A trust management model based on fuzzy reputation for internet of things
    • D. Chen, G. Chang, D. Sun, J. Li, J. Jia, and X. Wang TRM-IoT: a trust management model based on fuzzy reputation for internet of things Comput Sci Inf Syst 8 4 2011 1207 1228
    • (2011) Comput Sci Inf Syst , vol.8 , Issue.4 , pp. 1207-1228
    • Chen, D.1    Chang, G.2    Sun, D.3    Li, J.4    Jia, J.5    Wang, X.6
  • 20
    • 79953305088 scopus 로고    scopus 로고
    • Conflicts and incentives in wireless cooperative relaying: A distributed market pricing framework
    • L. Chen, L. Libman, and J. Leneutre Conflicts and incentives in wireless cooperative relaying: a distributed market pricing framework IEEE Trans Parallel Distributed Syst 22 5 2011 758 772
    • (2011) IEEE Trans Parallel Distributed Syst , vol.22 , Issue.5 , pp. 758-772
    • Chen, L.1    Libman, L.2    Leneutre, J.3
  • 21
    • 0022199386 scopus 로고
    • Verifiable secret sharing and achieving simultaneity in the presence of faults
    • Chor B, Goldwasser S, Micali, S, Awerbuch B. Verifiable secret sharing and achieving simultaneity in the presence of faults. In: Proceedings of 26th FOCS; 1985. p. 383-95.
    • (1985) Proceedings of 26th FOCS , pp. 383-395
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 26
    • 34247397030 scopus 로고    scopus 로고
    • Opportunistic cooperation by dynamic resource allocation
    • D. Gunduz, and E. Erkip Opportunistic cooperation by dynamic resource allocation, IEEE Trans Wirel Commun 6 2007 1446 1454
    • (2007) IEEE Trans Wirel Commun , vol.6 , pp. 1446-1454
    • Gunduz, D.1    Erkip, E.2
  • 28
    • 23844482975 scopus 로고    scopus 로고
    • Cooperative multihop transmission in wireless networks
    • P. Herhold, E. Zimmermann, and G. Fettweis Cooperative multihop transmission in wireless networks Comput Netw J 49 2005, pp. 299-324
    • (2005) Comput Netw J , vol.49 , pp. 299-324
    • Herhold, P.1    Zimmermann, E.2    Fettweis, G.3
  • 31
    • 0037443355 scopus 로고    scopus 로고
    • Improvement of threshold proxy signature scheme
    • C.L. Hsu, T.S. Wu, and T.C. Wu Improvement of threshold proxy signature scheme Appl Math Comput 136 2003 315 321
    • (2003) Appl Math Comput , vol.136 , pp. 315-321
    • Hsu, C.L.1    Wu, T.S.2    Wu, T.C.3
  • 32
    • 55749099727 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a threshold proxy signature scheme
    • J. Hu, and J. Zhang Cryptanalysis and improvement of a threshold proxy signature scheme Comput Standards Interfaces 2008, 619-631
    • (2008) Comput Standards Interfaces , pp. 619-631
    • Hu, J.1    Zhang, J.2
  • 35
    • 0042209739 scopus 로고    scopus 로고
    • A micro-payment scheme encouraging collaboration in multi-hop cellular networks
    • Gosier, Guadeloupe; January
    • Jakobsson M, Hubaux J, Buttyan L. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In: Proceedings of financial crypto. Gosier, Guadeloupe; January 2003.
    • (2003) Proceedings of Financial Crypto
    • Jakobsson, M.1    Hubaux, J.2    Buttyan, L.3
  • 36
    • 0742303647 scopus 로고    scopus 로고
    • Coded cooperation in wireless communications: Space-time transmission and iterative decoding
    • M. Janani Coded cooperation in wireless communications: space-time transmission and iterative decoding IEEE Trans Signal Process 52 2 2004 362 371
    • (2004) IEEE Trans Signal Process , vol.52 , Issue.2 , pp. 362-371
    • Janani, M.1
  • 37
    • 34247167001 scopus 로고    scopus 로고
    • A Scalable and robust approach to collaboration enforcement in mobile ad-hoc networks
    • N. Jiang, K. Hua, and D. Liu A Scalable and robust approach to collaboration enforcement in mobile ad-hoc networks Commun Netw 9 Part 1 2007 56 66
    • (2007) Commun Netw , vol.9 , Issue.PART 1 , pp. 56-66
    • Jiang, N.1    Hua, K.2    Liu, D.3
  • 39
    • 79959526891 scopus 로고    scopus 로고
    • Stealthy attacks in wireless ad hoc networks: Detection and countermeasure
    • I. Khalil, and S. Bagchi Stealthy attacks in wireless ad hoc networks: detection and countermeasure IEEE Trans Mob Comput 10 8 2011 1096 1112
    • (2011) IEEE Trans Mob Comput , vol.10 , Issue.8 , pp. 1096-1112
    • Khalil, I.1    Bagchi, S.2
  • 40
    • 84861942886 scopus 로고    scopus 로고
    • Security analysis of a threshold proxy signature scheme
    • Kim K, Nyang D. Security analysis of a threshold proxy signature scheme. IACR cryptology eprint archive10; 2010. p. 400.
    • (2010) IACR Cryptology Eprint archive10 , pp. 400
    • Kim, K.1    Nyang, D.2
  • 42
    • 26444619804 scopus 로고    scopus 로고
    • Cooperative strategies and capacity theorem for relay networks
    • G. Kramer, M. Gastpar, and P. Gupta Cooperative strategies and capacity theorem for relay networks IEEE Trans Inf Theory 51 2005 3037
    • (2005) IEEE Trans Inf Theory , vol.51 , pp. 3037
    • Kramer, G.1    Gastpar, M.2    Gupta, P.3
  • 44
    • 5044252003 scopus 로고    scopus 로고
    • Cooperative diversity in wireless networks: Efficient protocols and outage behavior
    • J.N. Laneman, D.N.C. Tse, and G.W. Wornell Cooperative diversity in wireless networks: efficient protocols and outage behavior IEEE Trans Inf Theory 50(12), 2004
    • (2004) IEEE Trans Inf Theory 50(12)
    • Laneman, J.N.1    Tse, D.N.C.2    Wornell, G.W.3
  • 46
    • 10644262979 scopus 로고    scopus 로고
    • The security of a strong proxy signature scheme with proxy signer privacy protection
    • N. Lee, and M. Lee The security of a strong proxy signature scheme with proxy signer privacy protection Appl Math Comput 16 1 2005 807 812
    • (2005) Appl Math Comput , vol.16 , Issue.1 , pp. 807-812
    • Lee, N.1    Lee, M.2
  • 47
    • 83755219546 scopus 로고    scopus 로고
    • Misbehavior detection without channel information in cooperative networks
    • Lo Li-Chung, Huang Wan-Jen. Misbehavior detection without channel information in cooperative networks. VTC Fall; 2011. p. 1-5.
    • (2011) VTC Fall , pp. 1-5
    • Li-Chung, L.1    Huang, W.-J.2
  • 49
    • 70449488787 scopus 로고    scopus 로고
    • DSC: Cooperation incentive mechanism for multi-hop cellular networks
    • Dresden, Germany; June 14-18
    • Mahmoud M, Shen X. DSC: cooperation incentive mechanism for multi-hop cellular networks. In: Proceeedings of IEEE ICC. Dresden, Germany; June 14-18, 2009. p. 569-74.
    • (2009) Proceeedings of IEEE ICC , pp. 569-574
    • Mahmoud, M.1    Shen, X.2
  • 50
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signatures: Delegation of the power to sign messages
    • M. Mambo, K. Usuda, and E. Okamoto Proxy signatures: delegation of the power to sign messages IEICE Trans Fundam E79-A 9 1996 1338 1353
    • (1996) IEICE Trans Fundam , vol.79 A , Issue.9 , pp. 1338-1353
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 51
    • 34249313010 scopus 로고    scopus 로고
    • Tracing malicious relays in cooperative wireless communications
    • Y. Mao, and M. Wu Tracing malicious relays in cooperative wireless communications IEEE Trans Inf Forensics Secur 2 2 2007 198 212
    • (2007) IEEE Trans Inf Forensics Secur , vol.2 , Issue.2 , pp. 198-212
    • Mao, Y.1    Wu, M.2
  • 52
    • 4344599235 scopus 로고    scopus 로고
    • Cooperative multihop broadcast for wireless networks
    • I. Maric, and R.D. Yates Cooperative multihop broadcast for wireless networks IEEE J Sel Areas Commun 22 6 2004 1080 1088
    • (2004) IEEE J Sel Areas Commun , vol.22 , Issue.6 , pp. 1080-1088
    • Maric, I.1    Yates, R.D.2
  • 55
    • 0033351734 scopus 로고    scopus 로고
    • Bounds and techniques for efficient redistribution of secret shares to new access structures
    • K.M. Martin, R. Safavi-Naini, and H. Wang Bounds and techniques for efficient redistribution of secret shares to new access structures Comput J 42 8 1999 638 649
    • (1999) Comput J , vol.42 , Issue.8 , pp. 638-649
    • Martin, K.M.1    Safavi-Naini, R.2    Wang, H.3
  • 57
    • 44049089396 scopus 로고    scopus 로고
    • Optimal backpressure routing for wireless networks with multi-receiver diversity
    • M.J. Neely, and R. Urgaonkar Optimal backpressure routing for wireless networks with multi-receiver diversity Proc Conf Inf Sci Syst 2006 18 25
    • (2006) Proc Conf Inf Sci Syst , pp. 18-25
    • Neely, M.J.1    Urgaonkar, R.2
  • 58
    • 33847728756 scopus 로고    scopus 로고
    • Grouping and partner selection in cooperative wireless networks
    • A. Nosratinia, and T.E. Hunter Grouping and partner selection in cooperative wireless networks IEEE J Sel Areas Commun 25 2007 369
    • (2007) IEEE J Sel Areas Commun , vol.25 , pp. 369
    • Nosratinia, A.1    Hunter, T.E.2
  • 60
    • 33751255669 scopus 로고    scopus 로고
    • Identity-based secure collaboration in wireless ad hoc networks
    • J. Pan, L. Cai, X. Shen, and J. Mark Identity-based secure collaboration in wireless ad hoc networks Comput Netw 51 3 2007 853 865
    • (2007) Comput Netw , vol.51 , Issue.3 , pp. 853-865
    • Pan, J.1    Cai, L.2    Shen, X.3    Mark, J.4
  • 64
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad hoc wireless networks
    • E. Royer, and C.-K. Tob A review of current routing protocols for ad hoc wireless networks IEEE Pers Commun 6(2), 1999 46 55
    • (1999) IEEE Pers Commun 6(2) , pp. 46-55
    • Royer, E.1    Tob, C.-K.2
  • 66
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir How to share a secret Commun ACM 22 11 1979 612 613
    • (1979) Commun ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 71
    • 84944048103 scopus 로고    scopus 로고
    • Unconditionally secure proactive secret sharing scheme with combinatorial structures, SAC99
    • Stinson D, Wei R. Unconditionally secure proactive secret sharing scheme with combinatorial structures, SAC99. In: Lecture notes in computer science, vol. 1758; 1999. p. 200-14.
    • (1999) Lecture Notes in Computer Science , vol.1758 , pp. 200-214
    • Stinson, D.1    Wei, R.2
  • 72
    • 84906821848 scopus 로고    scopus 로고
    • Network connectivity in wireless sensor networks: A survey
    • Sultan A, et al. Network connectivity in wireless sensor networks: a survey. In: Proceedings of PGNet; 2009.
    • (2009) Proceedings of PGNet
    • Sultan, A.1
  • 73
    • 0032670844 scopus 로고    scopus 로고
    • An efficient nonrepudiable threshold proxy signature scheme with known signers
    • H.M. Sun An efficient nonrepudiable threshold proxy signature scheme with known signers Comput Commun 22 8 1999 717 722
    • (1999) Comput Commun , vol.22 , Issue.8 , pp. 717-722
    • Sun, H.M.1
  • 74
    • 24644491882 scopus 로고    scopus 로고
    • On the security of some nonrepudiable threshold proxy signature schemes
    • Springer-Verlag
    • Tan Z-W, Liu Z-J, Wang M-S. On the security of some nonrepudiable threshold proxy signature schemes. ISPEC 2005. Lecture notes in computer science, vol. 3439. Springer-Verlag; 2005. p. 374-85.
    • (2005) ISPEC 2005. Lecture Notes in Computer Science , vol.3439 , pp. 374-385
    • Tan, Z.-W.1    Liu, Z.-J.2    Wang, M.-S.3
  • 75
    • 33845927130 scopus 로고    scopus 로고
    • Dynamic threshold and cheater resistance for shamir secret sharing scheme
    • Springer-Verlag
    • Tartary C, Wang H. Dynamic threshold and cheater resistance for shamir secret sharing scheme. In: Proceedings of Inscrypt06, LNCS, vol. 4318. Springer-Verlag; 2006. p. 103-17.
    • (2006) Proceedings of Inscrypt06, LNCS , vol.4318 , pp. 103-117
    • Tartary, C.1    Wang, H.2
  • 76
    • 79959891340 scopus 로고    scopus 로고
    • Node disjoint multipath routing considering link and node stability protocol: A characteristic evaluation
    • S. Upadhayaya, and C. Gandhi Node disjoint multipath routing considering link and node stability protocol: a characteristic evaluation IJCSI Int J Comput Sci Issues 7 1 2010 18 25
    • (2010) IJCSI Int J Comput Sci Issues , vol.7 , Issue.1 , pp. 18-25
    • Upadhayaya, S.1    Gandhi, C.2
  • 77
    • 34548364231 scopus 로고    scopus 로고
    • Distributed relay selection and power control for multiuser cooperative communication networks using buyer/seller game
    • Wang B, Han Z, Liu K. Distributed relay selection and power control for multiuser cooperative communication networks using buyer/seller game. In: IEEE INFOCOM proceedings; 2007. p. 544-52.
    • (2007) IEEE INFOCOM Proceedings , pp. 544-552
    • Wang, B.1    Han, Z.2    Liu, K.3
  • 78
    • 33645655242 scopus 로고    scopus 로고
    • Low-cost routing in selfish and rational wireless ad hoc networks
    • W. Wang, and X.Y. Li Low-cost routing in selfish and rational wireless ad hoc networks IEEE Trans Mob Comput 5 2006 596 607
    • (2006) IEEE Trans Mob Comput , vol.5 , pp. 596-607
    • Wang, W.1    Li, X.Y.2
  • 80
  • 82
    • 6344258648 scopus 로고    scopus 로고
    • 2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks
    • San Francisco, CA, USA
    • Yau PW., Mitchell CJ. 2HARP: a secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks. In: Proceedings of the 5th world wireless congress. San Francisco, CA, USA; 2004. p. 1-6.
    • (2004) Proceedings of the 5th World Wireless Congress , pp. 1-6
    • Yau, P.W.1    Mitchell, C.J.2
  • 83
    • 55749099677 scopus 로고    scopus 로고
    • An efficient anonymous proxy signature scheme with provable security
    • Yong Yu, Chunxiang Xu, Xinyi Huang, and Mu Yi An efficient anonymous proxy signature scheme with provable security Comput Standards Interfaces 31 2 2009 348 353
    • (2009) Comput Standards Interfaces , vol.31 , Issue.2 , pp. 348-353
    • Yu, Y.1    Xu, C.2    Huang, X.3    Yi, M.4
  • 84
    • 0842289309 scopus 로고    scopus 로고
    • Diversity in relaying protocols with amplify and forward
    • December
    • Yuksel M., Erkip E. Diversity in relaying protocols with amplify and forward. In: Proceedings of IEEE GLOBECOM, vol. 4; December 2003. p. 2025-9.
    • (2003) Proceedings of IEEE GLOBECOM , vol.4 , pp. 2025-2029
    • Yuksel, M.1    Erkip, E.2
  • 86
    • 61349084238 scopus 로고    scopus 로고
    • Competitive resource sharing based on game theory in cooperative relay networks
    • G. Zhang, L. Cong, and K. Yang et al. Competitive resource sharing based on game theory in cooperative relay networks ETRI J 31 1 2009 89 91
    • (2009) ETRI J , vol.31 , Issue.1 , pp. 89-91
    • Zhang, G.1    Cong, L.2    Yang, K.3
  • 87
    • 80051478463 scopus 로고    scopus 로고
    • Another efficient proxy signature scheme in the standard model
    • J. Zhang, and J Mao Another efficient proxy signature scheme in the standard model J Inf Sci Eng 27 4 2011 1249 1264
    • (2011) J Inf Sci Eng , vol.27 , Issue.4 , pp. 1249-1264
    • Zhang, J.1    Mao, J.2
  • 89
    • 61349084238 scopus 로고    scopus 로고
    • Competitive resource sharing based on game theory in cooperative relay networks
    • L. Zhang, L. Cong, K. Zhao, Yang, and H. Zhang Competitive resource sharing based on game theory in cooperative relay networks ETRI J 31 2009 89 91
    • (2009) ETRI J , vol.31 , pp. 89-91
    • Zhang, L.1    Cong, L.2    Zhao, K.3    Yang4    Zhang, H.5
  • 90
    • 77954323664 scopus 로고    scopus 로고
    • Collusion attack resistance and practice-oriented threshold changeable secret sharing schemes
    • Zhang X, He M. Collusion attack resistance and practice-oriented threshold changeable secret sharing schemes. In: Proceedings of AINA10. 2010. p. 745-2.
    • (2010) Proceedings of AINA10 , pp. 745-752
    • Zhang, X.1    He, M.2
  • 91
    • 34547532527 scopus 로고    scopus 로고
    • A secure incentive protocol for mobile ad hoc networks
    • Y. Zhang, W. Lou, W. Liu, and Y. Fang A secure incentive protocol for mobile ad hoc networks Wirel Netw 13 5 2007 569 582
    • (2007) Wirel Netw , vol.13 , Issue.5 , pp. 569-582
    • Zhang, Y.1    Lou, W.2    Liu, W.3    Fang, Y.4
  • 92
    • 80051888902 scopus 로고    scopus 로고
    • Secure monitoring scheme for wireless sensor networks based on identity signcryption
    • C. Zhe, and L. Yuanning Secure monitoring scheme for wireless sensor networks based on identity signcryption Comput Sci Autom Eng 4 2008 309 312
    • (2008) Comput Sci Autom Eng , vol.4 , pp. 309-312
    • Zhe, C.1    Yuanning, L.2
  • 93
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks
    • March-April
    • Zhong S, Yang YR, Chen J. Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks. In: Proceedings of IEEE Conference INFOCOM03; March-April 2003.
    • (2003) Proceedings of IEEE Conference INFOCOM03
    • Zhong, S.1    Yang, Y.R.2    Chen, J.3
  • 94
    • 32144433522 scopus 로고    scopus 로고
    • On designing incentive compatible routing and forwarding protocols in wireless ad-hoc networks
    • August
    • Zhong S, Li L, Liu YG, Yang YR. On designing incentive compatible routing and forwarding protocols in wireless ad-hoc networks. In: Proceedings of ACM MobiCom05; August 2005.
    • (2005) Proceedings of ACM MobiCom05
    • Zhong, S.1    Li, L.2    Liu, Y.G.3    Yang, Y.R.4
  • 95
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou, and Z.J. Haas Securing ad hoc networks IEEE Netw Mag 13 6 1999 24 30
    • (1999) IEEE Netw Mag , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.