Collaboration Model Design to Improve Malicious Node Detection Rate in MANET |
Shin, Eon-Seok
(육군본부)
Jeon, Seo-In (육군본부) Park, Gun-Woo (육군본부) Ryu, Keun-Ho (충북대학교 전자정보대학) |
1 | D.Elma, G., Nils, A., Pete, M. and Jens, T., "Detecting black hole attacks in tactical MANET using topology graphs", In Proceedings of the 32nd IEEE conference on local compute networks, pp.1043-1052, 2007. |
2 | Hong, D., "Routing Security in ad hoc Networks", IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, Vol.40, No.10, pp.70-75, 2 |
3 | Jinsub, K., Dan, S., Rommie, H., Roshan, K. and Lang, T., "Timing-based localization of in-band wormhole tunnels in MANETs", In Proceedings of the 3rd ACM conference on Wireless network security, pp.1-12, 2010. |
4 | Yang, H., Luo, H., Ye, F. and Zhang, L., "Security in Mobile ad hoc Networks : Challenges and Solutions", IEEE Wireless Communications, Vol.11, Issue.1, pp.38-47, 2004. |
5 | Zapata, M. G. and Asokan, N., "Securing ad hoc routing protocols", In Proceedings of the 1st ACM workshop on Wireless security. pp.1-10, 2002. |
6 | Abdul, H. A. and Zuriati, A. Z.,"Performance Comparison of AODV, DSDV and I-DSDV Routing Protocols in Mobile ad hoc Networks", European Journal of Scientific Research, Vol.31, No.4, pp.566-576, 2009. |
7 | Usop, N. S., Abdullah, A. and Abidin, A. F., "Performance Evaluation of AODV, DSDV & DSR Routing Protocol in Grid Environment", IJCSNS International Journal of Computer Science and Network Security, Vol.9, No.7, pp.261-268, 2009. |
8 | Hwang Y. C., Kim J. I. and Kim, J. S, "Malicious Node Detection Mechanism of Consideration Compromised Node in MANET", KIIT, Vol.7, No.5, pp.113-124, 2009. |
9 | Park, S. S., Park, G. W., Ryu, K. H, and Lee, S. H, "A Secure Routing Protocol in MANET based on Malicious behavior Pattern of Node and Trust Level", KSCI, Vol.14, No.5, pp.103-117, 2009. 과학기술학회마을 |