DETECTION AND ISOLATION OF RELUCTANT NODES USING REPUTATION BASED SCHEME IN AN AD-HOC NETWORK
暂无分享,去创建一个
[1] Luiz A. DaSilva,et al. A reputation-based mechanism for isolating selfish nodes in ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[2] Ralf Steinmetz,et al. On the effect of node misbehavior in ad hoc networks , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[3] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[4] David A. Maltz,et al. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.
[5] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[6] Mehdi Dehghan,et al. A secure credit-based cooperation stimulating mechanism for MANETs using hash chains , 2009, Future Gener. Comput. Syst..
[7] Haiying Shen,et al. ARM: An Account-Based Hierarchical Reputation Management System for Wireless Ad Hoc Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[8] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[9] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[10] Christos Douligeris,et al. Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.
[11] Benxiong Huang,et al. COSR: Cooperative On-Demand Secure Route Protocol in MANET , 2006, 2006 International Symposium on Communications and Information Technologies.
[12] Anchare V. Babu,et al. Node Isolation Probability of Wireless Adhoc Networks in Nagakami Fading Channel , 2010, ArXiv.
[13] Wesley Chee-Wah Tan,et al. Enforcing Cooperation in an Ad Hoc Network using a Cost-Credit Based Forwarding and Routing Approach , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[14] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] Jean-Yves Le Boudec,et al. Self-Policing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.