메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Securely detecting an intruders in MANETs system

Author keywords

Digital signature; digital signature algorithm(DSA); Enhance Adaptive ACKnowledgmet(AACK) (EAACK); Mobile Ad hoc NETwork (MANET)

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; EMBEDDED SYSTEMS; INTRUSION DETECTION; MOBILE SECURITY;

EID: 84925325864     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICICES.2014.7033773     Document Type: Conference Paper
Times cited : (2)

References (18)
  • 1
    • 42549125147 scopus 로고    scopus 로고
    • A Petri net design of command filters for semiautonomous mobile sensor networks
    • Apr.
    • J.-S. Lee, "A Petri net design of command filters for semiautonomous mobile sensor networks", IEEE Trans. Ind. Electron., vol. 55, no. 4, pp. 1835-1841, Apr. 2008.
    • (2008) IEEE Trans. Ind. Electron. , vol.55 , Issue.4 , pp. 1835-1841
    • Lee, J.-S.1
  • 2
    • 33947624156 scopus 로고    scopus 로고
    • An acknowledgment-based approach for the detection of routing misbehavior in MANETs
    • May
    • K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs", IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536-550, May 2007.
    • (2007) IEEE Trans. Mobile Comput. , vol.6 , Issue.5 , pp. 536-550
    • Liu, K.1    Deng, J.2    Varshney, P.K.3    Balakrishnan, K.4
  • 5
    • 38549088052 scopus 로고    scopus 로고
    • Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network
    • Glasgow, Scotland, Jun. 24-28
    • N. Nasser and Y. Chen, "Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network", in Proc. IEEE Int. Conf. Commun., Glasgow, Scotland, Jun. 24-28, 2007, pp. 1154-1159.
    • (2007) Proc. IEEE Int. Conf. Commun. , pp. 1154-1159
    • Nasser, N.1    Chen, Y.2
  • 7
    • 84944714533 scopus 로고    scopus 로고
    • Collaborative security architecture for black hole attack prevention in mobile ad hoc networks
    • Patcha and A. Mishra, "Collaborative security architecture for black hole attack prevention in mobile ad hoc networks", in Proc. Radio Wireless Conf., 2003, pp. 75-78.
    • (2003) Proc. Radio Wireless Conf. , pp. 75-78
    • Patcha1    Mishra, A.2
  • 9
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb.
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1983.
    • (1983) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 10
    • 70349669239 scopus 로고    scopus 로고
    • Video transmission enhancement in presence ofmisbehaving nodes in MANETs
    • Oct.
    • T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, "Video transmission enhancement in presence ofmisbehaving nodes in MANETs", Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273-282, Oct. 2009.
    • (2009) Int. J. Multimedia Syst. , vol.15 , Issue.5 , pp. 273-282
    • Sheltami, T.1    Al-Roubaiey, A.2    Shakshuki, E.3    Mahmoud, A.4
  • 11
    • 0036957315 scopus 로고    scopus 로고
    • ARIADNE: A secure ondemand routing protocol for ad hoc networks
    • Atlanta, GA
    • Y. Hu, A. Perrig, and D. Johnson, "ARIADNE: A secure ondemand routing protocol for ad hoc networks", in Proc. 8th ACM Int. Conf. Mobi Com, Atlanta, GA, 2002, pp. 12-23.
    • (2002) Proc. 8th ACM Int. Conf. Mobi Com , pp. 12-23
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 12
    • 76849098570 scopus 로고    scopus 로고
    • A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micropower generator
    • Mar.
    • Tabesh and L. G. Frechette, "A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micropower generator", IEEE Trans. Ind. Electron., vol. 57, no. 3, pp. 840-849, Mar. 2010.
    • (2010) IEEE Trans. Ind. Electron. , vol.57 , Issue.3 , pp. 840-849
    • Tabesh1    Frechette, L.G.2
  • 14
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad-hoc networks
    • Nov./Dec.
    • L. Zhou and Z. Haas, "Securing ad-hoc networks", IEEE Netw., vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
    • (1999) IEEE Netw. , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 16
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic Source Routing in ad hoc wireless networks
    • Norwell, MA: Kluwer, ch. 5
    • Johnson and D. Maltz, "Dynamic Source Routing in ad hoc wireless networks", in Mobile Computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153-181.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson1    Maltz, D.2
  • 17
    • 84925317189 scopus 로고    scopus 로고
    • Ts, Paris, France, Nov. 8-10
    • Ts", in Proc. 12th Int. Conf. ii WAS, Paris, France, Nov. 8-10, 2010, pp. 216-222.
    • (2010) Proc. 12th Int. Conf. Ii WAS , pp. 216-222
  • 18
    • 79956043667 scopus 로고    scopus 로고
    • Detecting misbehaving nodesin MANETs
    • Paris, France, Nov. 8-10
    • N. Kang, E. Shakshuki, and T. Sheltami, "Detecting misbehaving nodesin MANETs", in Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8-10, 2010, pp. 216-222.
    • (2010) Proc. 12th Int. Conf iiWAS , pp. 216-222
    • Kang, N.1    Shakshuki, E.2    Sheltami, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.