메뉴 건너뛰기




Volumn 321, Issue , 2015, Pages 83-95

Enhancing the security of dynamic source routing protocol using energy aware and distributed trust mechanism in manets

Author keywords

[No Author keywords available]

Indexed keywords

DYNAMICS; ELECTRIC NETWORK TOPOLOGY; ENERGY EFFICIENCY; MOBILE AD HOC NETWORKS; NETWORK ROUTING; NETWORK SECURITY; POWER MANAGEMENT; ROUTING PROTOCOLS; TELECOMMUNICATION NETWORKS; TOPOLOGY;

EID: 84921395740     PISSN: 21945357     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-319-11227-5_8     Document Type: Article
Times cited : (12)

References (24)
  • 6
    • 0036804761 scopus 로고    scopus 로고
    • Routing Security inWireless Ad hoc Networks
    • Deng, H., Li W., Agrawal, D.P.: Routing Security inWireless Ad hoc Networks. IEEE Communications Magazine 40(10), 70–75 (2002)
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 70-75
    • Deng, H.1    Li, W.2    Agrawal, D.P.3
  • 8
    • 33646848807 scopus 로고    scopus 로고
    • A Routing Protocol Based on Trust for MANETs
    • In: Zhuge, H., Fox, G.C. (eds.), Springer, Heidelberg
    • Wang, C., Yang, X., Gao, Y.: A Routing Protocol Based on Trust for MANETs. In: Zhuge, H., Fox, G.C. (eds.) GCC 2005. LNCS, vol. 3795, pp. 959–964. Springer, Heidelberg (2005)
    • (2005) GCC 2005. LNCS , vol.3795 , pp. 959-964
    • Wang, C.1    Yang, X.2    Gao, Y.3
  • 11
    • 33144465932 scopus 로고    scopus 로고
    • Information Theoretic Framework of TrustModeling and Evaluation for Ad Hoc Networks
    • Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information Theoretic Framework of TrustModeling and Evaluation for Ad Hoc Networks. IEEE Journal on Selected Areas in Communications 24(2), 305–317 (2006)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.L.1    Yu, W.2    Han, Z.3    Liu, K.J.R.4
  • 13
    • 56949106800 scopus 로고    scopus 로고
    • A trust-based security system for ubiquitous and pervasive computing environments
    • Boukerche, A., Ren, Y.: A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications 31(18), 4343–4351 (2008)
    • (2008) Computer Communications , vol.31 , Issue.18 , pp. 4343-4351
    • Boukerche, A.1    Ren, Y.2
  • 14
    • 43449107967 scopus 로고    scopus 로고
    • Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
    • Raza, I., Hussain, S.A.: Identification of malicious nodes in an AODV pure ad hoc network through guard nodes. Computer Communications 31(9), 1796–1802 (2008)
    • (2008) Computer Communications , vol.31 , Issue.9 , pp. 1796-1802
    • Raza, I.1    Hussain, S.A.2
  • 16
    • 39049100803 scopus 로고    scopus 로고
    • Security in mobile adhoc networks using soft encryption and trust based multipath routing. Sci. Direct Comput
    • Narula, P., Dhurandher, S.K., Misra, S., Woungang, I.: Security in mobile adhoc networks using soft encryption and trust based multipath routing. Sci. Direct Comput. Commun. 31, 760–769 (2008)
    • (2008) Commun , vol.31 , pp. 760-769
    • Narula, P.1    Dhurandher, S.K.2    Misra, S.3    Woungang, I.4
  • 17
    • 70349749980 scopus 로고    scopus 로고
    • A protocol for data availability inMobile Ad-Hoc Networks in the presence of insider attacks
    • Ayday, E., Fekri, F.: A protocol for data availability inMobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks 8(2), 181–192 (2010)
    • (2010) Ad Hoc Networks , vol.8 , Issue.2 , pp. 181-192
    • Ayday, E.1    Fekri, F.2
  • 18
    • 78650394299 scopus 로고    scopus 로고
    • Trust-based on-demand multipath routing in mobile ad hoc networks
    • Li, X., Jia, Z., Zhang, P., Zhang, R., Wang, H.: Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security 4(4), 212 (2010)
    • (2010) IET Information Security , vol.4 , Issue.4 , pp. 212
    • Li, X.1    Jia, Z.2    Zhang, P.3    Zhang, R.4    Wang, H.5
  • 20
    • 79956101475 scopus 로고    scopus 로고
    • Building a trusted route in a mobile ad hoc network considering communication reliability and path length
    • Wang, J., Liu, Y., Jiao, Y.: Building a trusted route in a mobile ad hoc network considering communication reliability and path length. Journal of Network and Computer Applications 34(4), 1138–1149 (2011)
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.4 , pp. 1138-1149
    • Wang, J.1    Liu, Y.2    Jiao, Y.3
  • 21
    • 79957709100 scopus 로고    scopus 로고
    • FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems
    • Dhurandher, S.K., Obaidat, M.S., Verma, K., Gupta, P., Dhurandher, P.: FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems. IEEE Systems Journal 5(2), 176–188 (2011)
    • (2011) IEEE Systems Journal , vol.5 , Issue.2 , pp. 176-188
    • Dhurandher, S.K.1    Obaidat, M.S.2    Verma, K.3    Gupta, P.4    Dhurandher, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.