메뉴 건너뛰기




Volumn 30, Issue , 2015, Pages 84-98

Trust based routing mechanism for securing OSLR-based MANET

Author keywords

Ad hoc networks; Trust based routing algorithm; Trust model

Indexed keywords

AD HOC NETWORKS; FUZZY NEURAL NETWORKS; MOBILE SECURITY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK ROUTING; NETWORK SECURITY; PETRI NETS;

EID: 84926408445     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2015.03.004     Document Type: Article
Times cited : (104)

References (30)
  • 1
    • 2442551009 scopus 로고    scopus 로고
    • Optimized Link State Routing Protocol (OLSR)
    • T. Clausen, P. Jacquet, Optimized Link State Routing Protocol (OLSR), in: IETF RFC3626, 2003, pp. 1-75.
    • (2003) IETF RFC3626 , pp. 1-75
    • Clausen, T.1    Jacquet, P.2
  • 2
    • 84875465579 scopus 로고    scopus 로고
    • Enhanced OLSR for defense against DOS attack in ad hoc networks
    • M. Marimuthu, and I. Krishnamurthi Enhanced OLSR for defense against DOS attack in ad hoc networks J. Commun. Networks 15 2013 31 37
    • (2013) J. Commun. Networks , vol.15 , pp. 31-37
    • Marimuthu, M.1    Krishnamurthi, I.2
  • 5
    • 80052184498 scopus 로고    scopus 로고
    • A framework for packet-droppers mitigation in OLSR wireless community networks
    • Francesco Saverio Proto, and Andrea Detti A framework for packet-droppers mitigation in OLSR wireless community networks IEEE Int. Conf. Commun. (ICC) 2011 1 6
    • (2011) IEEE Int. Conf. Commun. (ICC) , pp. 1-6
    • Proto, F.S.1    Detti, A.2
  • 6
    • 34247506368 scopus 로고    scopus 로고
    • Analysis of the node isolation attack against OLSR-based mobile ad hoc networks
    • Bounpadith Kannhavong, and Hidehisa Nakayama Analysis of the node isolation attack against OLSR-based mobile ad hoc networks Int. Symp. Comput. Networks 2006 30 35
    • (2006) Int. Symp. Comput. Networks , pp. 30-35
    • Kannhavong, B.1    Nakayama, H.2
  • 9
    • 84891936588 scopus 로고    scopus 로고
    • Broadcast encryption based non-interactive key distribution in MANETs
    • 533-545
    • Y. Yang Broadcast encryption based non-interactive key distribution in MANETs J Comput Syst Sci 2014 80; 533 545
    • (2014) J Comput Syst Sci , pp. 80
    • Yang, Y.1
  • 10
    • 84893132480 scopus 로고    scopus 로고
    • A cryptographybased protocol against packet dropping and message tampering attacks on mobile ad hoc networks
    • S. Obaidat M, I. Woungang, and S.K. Dhurandher A cryptographybased protocol against packet dropping and message tampering attacks on mobile ad hoc networks Secur. Commun. Networks 7 2014 376 384
    • (2014) Secur. Commun. Networks , vol.7 , pp. 376-384
    • Obaidat, M.S.1    Woungang, I.2    Dhurandher, S.K.3
  • 12
    • 77950567366 scopus 로고    scopus 로고
    • Defending against Node misbehavior to discover secure route in OLSR
    • Sanjeev Rana, and Anil Kapil Defending against Node misbehavior to discover secure route in OLSR Commun. Comput. Inf. Sci. 70 2010 430 436
    • (2010) Commun. Comput. Inf. Sci. , vol.70 , pp. 430-436
    • Rana, S.1    Kapil, A.2
  • 13
    • 84856423051 scopus 로고    scopus 로고
    • RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks
    • J.M. Robert, H. Otrok, and A. Chriqi RBC-OLSR: reputation-based clustering OLSR protocol for wireless ad hoc networks Comput. Commun. 35 2012 487 499
    • (2012) Comput. Commun. , vol.35 , pp. 487-499
    • Robert, J.M.1    Otrok, H.2    Chriqi, A.3
  • 14
    • 84878352310 scopus 로고    scopus 로고
    • Trust-based security for the OLSR routing protocol
    • Asma Adnane, and Christophe Bidan Trust-based security for the OLSR routing protocol Comput. Commun. 36 2013 1159 1171
    • (2013) Comput. Commun. , vol.36 , pp. 1159-1171
    • Adnane, A.1    Bidan, C.2
  • 16
    • 70749153484 scopus 로고    scopus 로고
    • Trust-based countermeasures for securing OLSR protocol
    • Asmaa Adnane, Christophe Bidan, and R.T. de Sousa Trust-based countermeasures for securing OLSR protocol Int. Conf. Comput. Sci. Eng. 2 2009 745 752
    • (2009) Int. Conf. Comput. Sci. Eng. , vol.2 , pp. 745-752
    • Adnane, A.1    Bidan, C.2    De Sousa, R.T.3
  • 17
    • 34548043694 scopus 로고    scopus 로고
    • Trust-based security for wireless ad hoc and sensor networks
    • A. Boukerch, L. Xu, and K. El-Khatib Trust-based security for wireless ad hoc and sensor networks Comput. Commun. 11 2007 2413 2427
    • (2007) Comput. Commun. , vol.11 , pp. 2413-2427
    • Boukerch, A.1    Xu, L.2    El-Khatib, K.3
  • 18
    • 80052880154 scopus 로고    scopus 로고
    • Autonomic trust management for a component-based software system
    • Z. Yan, and P. Christian Autonomic trust management for a component-based software system IEEE Trans. Dependable Secure Comput. 8 2011 810 823
    • (2011) IEEE Trans. Dependable Secure Comput. , vol.8 , pp. 810-823
    • Yan, Z.1    Christian, P.2
  • 20
    • 84865687679 scopus 로고    scopus 로고
    • Formal specification of trusted neighbor information base of OLSR routing protocol of adhoc network using Z language
    • A. Verma, and S. Gujral M Formal specification of trusted neighbor information base of OLSR routing protocol of adhoc network using Z language Global Trends Comput. Commun. Syst. 2012 560 570
    • (2012) Global Trends Comput. Commun. Syst. , pp. 560-570
    • Verma, A.1    Gujral, M.S.2
  • 21
    • 79952502889 scopus 로고    scopus 로고
    • Misbehavior nodes detection and isolation for MANETs OLSR protocol
    • A.M. Abdalla, and I.A. Saroit Misbehavior nodes detection and isolation for MANETs OLSR protocol Procedia Comput. Sci. 3 2011 115 121
    • (2011) Procedia Comput. Sci. , vol.3 , pp. 115-121
    • Abdalla, A.M.1    Saroit, I.A.2
  • 22
    • 84885300345 scopus 로고    scopus 로고
    • On the tradeoff between altruism and selfishness in MANET trust management
    • J.H. Cho, and I.R. Chen On the tradeoff between altruism and selfishness in MANET trust management Ad Hoc Netw. 11 2013 2217 2234
    • (2013) Ad Hoc Netw. , vol.11 , pp. 2217-2234
    • Cho, J.H.1    Chen, I.R.2
  • 23
    • 84877998022 scopus 로고    scopus 로고
    • A credible routing based on a novel trust mechanism in ad hoc networks
    • R. Feng, and S. Che A credible routing based on a novel trust mechanism in ad hoc networks Int. J. Distrib. Sens. Netw. 2013 10.1155/2013/652051
    • (2013) Int. J. Distrib. Sens. Netw.
    • Feng, R.1    Che, S.2
  • 24
    • 84883463898 scopus 로고    scopus 로고
    • Trust prediction and trust-based source routing in mobile ad hoc networks
    • Hui Xia, and Z. Jia Trust prediction and trust-based source routing in mobile ad hoc networks Ad Hoc Netw. 11 2013 2096 2114
    • (2013) Ad Hoc Netw. , vol.11 , pp. 2096-2114
    • Xia, H.1    Jia, Z.2
  • 25
    • 84877695525 scopus 로고    scopus 로고
    • Impact of trust model on on-demand multi-path routing in mobile ad hoc networks
    • Hui Xia, and Zhiping Jia Impact of trust model on on-demand multi-path routing in mobile ad hoc networks Comput. Commun. 36 2013 1078 1093
    • (2013) Comput. Commun. , vol.36 , pp. 1078-1093
    • Xia, H.1    Jia, Z.2
  • 26
    • 78650394299 scopus 로고    scopus 로고
    • Trust-based on-demand multipath routing in mobile ad hoc networks
    • X. Li, Z. Jia, and P. Zhang Trust-based on-demand multipath routing in mobile ad hoc networks IET Inf. Secur. 4 2010 212 232
    • (2010) IET Inf. Secur. , vol.4 , pp. 212-232
    • Li, X.1    Jia, Z.2    Zhang, P.3
  • 27
    • 0032627201 scopus 로고    scopus 로고
    • A fuzzy Petri net-based expert system and its application to damage assessment of bridges
    • J. Lee, R. Liu K F, and W. Chiang A fuzzy Petri net-based expert system and its application to damage assessment of bridges IEEE Trans. Syst. Man Cybern.-Part B: Cybern. 29 1999 350 370
    • (1999) IEEE Trans. Syst. Man Cybern.-Part B: Cybern. , vol.29 , pp. 350-370
    • Lee, J.1    Liu, K.F.R.2    Chiang, W.3
  • 28
    • 1842421851 scopus 로고    scopus 로고
    • Fuzzy Petri net based formalized reasoning algorithm with applications
    • L.X. Jia, J.Y. Xun, and F. Ru Fuzzy Petri net based formalized reasoning algorithm with applications J. Xian Jiaotong Univ. 37 2003 1263 1266
    • (2003) J. Xian Jiaotong Univ. , vol.37 , pp. 1263-1266
    • Jia, L.X.1    Xun, J.Y.2    Ru, F.3
  • 29
    • 84888212025 scopus 로고    scopus 로고
    • Knowledge acquisition and representation using fuzzy evidential reasoning and dynamic adaptive fuzzy Petri nets
    • H.C. Liu, and L. Liu Knowledge acquisition and representation using fuzzy evidential reasoning and dynamic adaptive fuzzy Petri nets IEEE Trans. Cybern. 43 2013 1059 1072
    • (2013) IEEE Trans. Cybern. , vol.43 , pp. 1059-1072
    • Liu, H.C.1    Liu, L.2
  • 30


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.