메뉴 건너뛰기




Volumn 15, Issue 8, 2016, Pages 1893-1907

AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks

Author keywords

ad hoc networks; Misbehavior; packet dropping; reputation system; secure routing; wireless communications

Indexed keywords

AD HOC NETWORKS; DIRECTIVE ANTENNAS; MOBILE TELECOMMUNICATION SYSTEMS; TELECOMMUNICATION NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84978933144     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2012.257     Document Type: Article
Times cited : (44)

References (33)
  • 2
    • 39149117709 scopus 로고    scopus 로고
    • ODSBR: An on-demand secure byzantine resilient routing protocol for wireless Ad Hoc networks
    • B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An on-demand secure byzantine resilient routing protocol for wireless Ad Hoc networks," ACM Trans. Inform. Syst. Security, vol. 10, no. 4, pp. 11-35, 2008.
    • (2008) ACM Trans. Inform. Syst. Security , vol.10 , Issue.4 , pp. 11-35
    • Awerbuch, B.1    Curtmola, R.2    Holmer, D.3    Nita-Rotaru, C.4    Rubens, H.5
  • 4
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 5
    • 24744432675 scopus 로고    scopus 로고
    • Self-policing mobile Ad-Hoc networks by reputation systems
    • Jul
    • S. Buchegger and J.-Y. L. Boudec, "Self-policing mobile Ad-Hoc networks by reputation systems," IEEE Commun. Mag., vol. 43, no. 7, pp. 101-107, Jul. 2005.
    • (2005) IEEE Commun. Mag , vol.43 , Issue.7 , pp. 101-107
    • Buchegger, S.1    Boudec, J.-Y.L.2
  • 6
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in selforganizing mobile Ad Hoc networks
    • L. Buttyan and J.-P. Hubaux, "Stimulating cooperation in selforganizing mobile Ad Hoc networks," Mobile Netw. Appl., vol. 8, no. 5, pp. 579-592, 2003.
    • (2003) Mobile Netw. Appl , vol.8 , Issue.5 , pp. 579-592
    • Buttyan, L.1    Hubaux, J.-P.2
  • 10
    • 0035015898 scopus 로고    scopus 로고
    • Investigating the energy consumption of a wireless network interface in an Ad Hoc networking environment
    • L. M. Feeney and M. Nilsson, "Investigating the energy consumption of a wireless network interface in an Ad Hoc networking environment," in Proc. 20th Annu. Joint Conf. IEEE Comput. Commun. Soc., 2001, pp. 1548-1557.
    • (2001) Proc. 20th Annu. Joint Conf. IEEE Comput. Commun. Soc , pp. 1548-1557
    • Feeney, L.M.1    Nilsson, M.2
  • 11
    • 44849093503 scopus 로고    scopus 로고
    • Reputation-based framework for high integrity sensor networks
    • S. Ganeriwal, L. Balzano, and M. Srivastava, "Reputation-based framework for high integrity sensor networks, "ACM Trans. Sensor Netw., vol. 4, no. 3, pp. 1-37, 2008.
    • (2008) ACM Trans. Sensor Netw , vol.4 , Issue.3 , pp. 1-37
    • Ganeriwal, S.1    Balzano, L.2    Srivastava, M.3
  • 12
    • 84859095287 scopus 로고    scopus 로고
    • On the efficiency of fast RSA variants in modern mobile phones
    • K. Hansen, T. Larsen, and K. Olsen, "On the efficiency of fast RSA variants in modern mobile phones," Int. J. Computer Sci. Inf. Security, vol. 6, no. 3, 2009, pp. 136-140.
    • (2009) Int. J. Computer Sci. Inf. Security , vol.6 , Issue.3 , pp. 136-140
    • Hansen, K.1    Larsen, T.2    Olsen, K.3
  • 13
    • 4544283175 scopus 로고    scopus 로고
    • SORI: A secure and objective reputation-based incentive scheme for Ad Hoc networks
    • Q. He, D. Wu, and P. Khosla, "SORI: A secure and objective reputation-based incentive scheme for Ad Hoc networks," in Proc. IEEE Wireless Commun. Netw. Conf., 2004, pp. 825-830.
    • (2004) Proc. IEEE Wireless Commun. Netw. Conf , pp. 825-830
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 14
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The dynamic source routing protocol for multihop wireless ad hoc networks
    • Longman Publishing Co., Inc., Boston, MA, USA
    • D. Johnson, D. Maltz, and J. Broch, "DSR: the dynamic source routing protocol for multihop wireless ad hoc networks," In Ad hoc Netw., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2001, pp. 139-172.
    • (2001) Ad Hoc Netw., Addison-Wesley , pp. 139-172
    • Johnson, D.1    Maltz, D.2    Broch, J.3
  • 16
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Netw., vol. 1, no. 2/3, pp. 293-315, 2003.
    • (2003) Ad Hoc Netw , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 18
    • 70349161605 scopus 로고    scopus 로고
    • REAct: Resource-efficient accountability for node misbehavior in Ad Hoc networks based on random audits
    • W. Kozma Jr. and L. Lazos, "REAct: Resource-efficient accountability for node misbehavior in Ad Hoc networks based on random audits," in Proc. 2nd ACM Conf. Wireless Netw. Security, 2009, pp. 103-110.
    • (2009) Proc. 2nd ACM Conf. Wireless Netw. Security , pp. 103-110
    • Kozma, W.1    Lazos, L.2
  • 19
    • 33947624156 scopus 로고    scopus 로고
    • An acknowledgment- based approach for the detection of routing misbehavior in manets
    • May
    • K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, "An acknowledgment- based approach for the detection of routing misbehavior in manets," IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536-550, May 2007.
    • (2007) IEEE Trans. Mobile Comput , vol.6 , Issue.5 , pp. 536-550
    • Liu, K.1    Deng, J.2    Varshney, P.3    Balakrishnan, K.4
  • 20
    • 84907706128 scopus 로고    scopus 로고
    • Reputation propagation and agreement in mobile Ad-Hoc networks
    • Y. Liu and Y. R. Yang, "Reputation propagation and agreement in mobile Ad-Hoc networks," in Proc. IEEE Wireless Commun. Netw., 2003, pp. 1510-1515.
    • (2003) Proc. IEEE Wireless Commun. Netw , pp. 1510-1515
    • Liu, Y.1    Yang, Y.R.2
  • 22
    • 85113133621 scopus 로고    scopus 로고
    • CORE: A collaborative reputation mechanism to enforce node cooperation in mobile Ad Hoc networks
    • P. Michiardi and R. Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile Ad Hoc networks," in Proc. 6th Joint Working Conf. Commun. Multimed. Security, 2002, pp. 107-121.
    • (2002) Proc. 6th Joint Working Conf. Commun. Multimed. Security , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 23
    • 2342630172 scopus 로고    scopus 로고
    • Secure traceroute to detect faulty or malicious routing
    • V.-N. Padmanabhan and D.-R. Simon, "Secure traceroute to detect faulty or malicious routing," SIGCOMM Comput. Commun. Rev., vol. 33, no. 1, pp. 77-82, 2003.
    • (2003) SIGCOMM Comput. Commun. Rev , vol.33 , Issue.1 , pp. 77-82
    • Padmanabhan, V.-N.1    Simon, D.-R.2
  • 24
    • 0003104638 scopus 로고
    • Detecting errors in searching games
    • A. Pelc, "Detecting errors in searching games," J. Combinatorial Theory Series A, vol. 51, no. 1, pp. 43-54, 1989.
    • (1989) J. Combinatorial Theory Series A , vol.51 , Issue.1 , pp. 43-54
    • Pelc, A.1
  • 26
    • 84860678494 scopus 로고    scopus 로고
    • Detection of malicious packet dropping in wireless Ad Hoc networks based on privacy-preserving public auditing
    • T. Shu and M. Krunz, "Detection of malicious packet dropping in wireless Ad Hoc networks based on privacy-preserving public auditing," in Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw., 2012, pp. 87-98.
    • (2012) Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw , pp. 87-98
    • Shu, T.1    Krunz, M.2
  • 32
    • 84979033462 scopus 로고    scopus 로고
    • Y. Zhang and L. Lazos (2012). Available: http://www2.engr.arizona. edu/ llazos/misc/AMDsimulator.zip
    • (2012)
    • Zhang, Y.1    Lazos, L.2
  • 33
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple cheat-proof, credit-based system for mobile Ad-Hoc networks
    • S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple cheat-proof, credit-based system for mobile Ad-Hoc networks," in Proc. 22nd IEEE Annu. Joint Conf. Comput. Commun., 2003, pp. 1987-1997.
    • (2003) Proc. 22nd IEEE Annu. Joint Conf. Comput. Commun , pp. 1987-1997
    • Zhong, S.1    Chen, J.2    Yang, Y.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.