메뉴 건너뛰기




Volumn 30, Issue 1, 2017, Pages

FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile Ad hoc network

Author keywords

AODV; fuzzy Petri net; MANET; routing; security

Indexed keywords

FUZZY INFERENCE; FUZZY SYSTEMS; MOBILE SECURITY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK ROUTING; NETWORK SECURITY; PETRI NETS; ROUTERS; ROUTING PROTOCOLS; TELECOMMUNICATION NETWORKS;

EID: 84922309367     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.2935     Document Type: Article
Times cited : (16)

References (36)
  • 1
    • 84863376110 scopus 로고    scopus 로고
    • Discovering AODV-based multipath routes in wireless ad hoc networks
    • Li G, Sun H. Discovering AODV-based multipath routes in wireless ad hoc networks. Security Comm. Networks 2012; 5: 374–383. DOI:10.1002/sec.322.
    • (2012) Security Comm. Networks , vol.5 , pp. 374-383
    • Li, G.1    Sun, H.2
  • 2
    • 34547542028 scopus 로고    scopus 로고
    • A survey of current architectures for connecting wireless mobile ad hoc networks to the Internet
    • Ammari HM. A survey of current architectures for connecting wireless mobile ad hoc networks to the Internet. International Journal of Communication Systems 2007; 20: 943–968. DOI:10.1002/dac.854.
    • (2007) International Journal of Communication Systems , vol.20 , pp. 943-968
    • Ammari, H.M.1
  • 4
    • 84899957360 scopus 로고    scopus 로고
    • Estimating reliability in mobile ad-hoc networks based on Monte Carlo simulation
    • Pouyan A, Yadollahzadeh Tabari M. Estimating reliability in mobile ad-hoc networks based on Monte Carlo simulation. International Journal of Engineering 2014; 7(5): 739–746.
    • (2014) International Journal of Engineering , vol.7 , Issue.5 , pp. 739-746
    • Pouyan, A.1    Yadollahzadeh Tabari, M.2
  • 6
    • 84863111146 scopus 로고    scopus 로고
    • A new security model to prevent denial-of-service attacks and violation of availability in wireless networks
    • Malekzadeh M, Ghani AAA, Subramaniam S. A new security model to prevent denial-of-service attacks and violation of availability in wireless networks. International Journal of Communication Systems 2012; 25: 903–925. DOI:10.1002/dac.1296.
    • (2012) International Journal of Communication Systems , vol.25 , pp. 903-925
    • Malekzadeh, M.1    Ghani, A.A.A.2    Subramaniam, S.3
  • 11
    • 50049132985 scopus 로고    scopus 로고
    • MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks
    • Khalil I, Bagchi S, Shroff NB. MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks. In the IEEE securecomm and workshops, 2006; 1–12.
    • (2006) In the IEEE securecomm and workshops , pp. 1-12
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3
  • 15
    • 84875234781 scopus 로고    scopus 로고
    • A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks
    • He D, Chen C, Ma M, Chan S, Bu J. A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks. International Journal of Communication Systems 2013; 26: 495–504. DOI:10.1002/dac.1355.
    • (2013) International Journal of Communication Systems , vol.26 , pp. 495-504
    • He, D.1    Chen, C.2    Ma, M.3    Chan, S.4    Bu, J.5
  • 22
    • 84892490580 scopus 로고    scopus 로고
    • Performance study of a wireless mobile ad hoc network with orientation-dependent internode communication scheme
    • Kostin A, Oz G, Haci H. Performance study of a wireless mobile ad hoc network with orientation-dependent internode communication scheme. International Journal of Communication Systems 2014; 27: 322–340.
    • (2014) International Journal of Communication Systems , vol.27 , pp. 322-340
    • Kostin, A.1    Oz, G.2    Haci, H.3
  • 25
    • 4143137391 scopus 로고    scopus 로고
    • Modelling and performance analysis of a novel position based reliable unicast and multicast routing method using coloured Petri nets
    • Erbas F, Kyamakya K, Jobmann K. Modelling and performance analysis of a novel position based reliable unicast and multicast routing method using coloured Petri nets. IEEE Communications Society, Globecom 2004 Workshops.
    • IEEE Communications Society, Globecom 2004 Workshops
    • Erbas, F.1    Kyamakya, K.2    Jobmann, K.3
  • 26
    • 60249103582 scopus 로고    scopus 로고
    • A knowledge-based inference multicast protocol using adaptive fuzzy Petri nets
    • Tzu-Chiang C, Cheng-Feng T, Ting-Wei H. A knowledge-based inference multicast protocol using adaptive fuzzy Petri nets. Expert Systems with Applications 2009; 36: 8115–8123.
    • (2009) Expert Systems with Applications , vol.36 , pp. 8115-8123
    • Tzu-Chiang, C.1    Cheng-Feng, T.2    Ting-Wei, H.3
  • 33
    • 0032186636 scopus 로고    scopus 로고
    • Parsec: a parallel simulation environment for complex systems
    • Bagrodia R, Meyer R, Takai M. Parsec: a parallel simulation environment for complex systems. IEEE Computer 1998; 31: 77–85.
    • (1998) IEEE Computer , vol.31 , pp. 77-85
    • Bagrodia, R.1    Meyer, R.2    Takai, M.3
  • 34
    • 78650394299 scopus 로고    scopus 로고
    • Trust-based on-demand multipath routing in mobile ad hoc networks
    • Li X, Jia Z, Zhang P, Zhang R, Wang H. Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security 2010; 4: 212–232.
    • (2010) IET Information Security , vol.4 , pp. 212-232
    • Li, X.1    Jia, Z.2    Zhang, P.3    Zhang, R.4    Wang, H.5
  • 35
    • 82455219325 scopus 로고    scopus 로고
    • Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory
    • Xia H, Jia1 Z, Ju L, Zhu Y. Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wirel. Sens. Syst. 2011; 1: 248–266.
    • (2011) IET Wirel. Sens. Syst. , vol.1 , pp. 248-266
    • Xia, H.1    Jia, Z.2    Ju, L.3    Zhu, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.