1 |
A. Urpi, M. Bonuccelli, and S. Giordano, "Modelling cooperation in mobile ad hoc networks: a formal description of selfishness," in WiOpt''03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003, INRIA Sophia-Antipolis, France, 2003.
|
2 |
G. F. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, "Cooperation enforcement schemes for MANETs: a survey," Wireless Communications and Mobile Computing, Vol. 6, No. 3, 2006, pp. 319-332.
DOI
ScienceOn
|
3 |
왕종수, 서두옥, "극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘," 디지털산업정보학회지, 제8권, 제1호, 2012, pp. 47-53.
|
4 |
I. Khalil, "Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks," in DSN ''05: Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN''05), 2005, pp . 612-621.
|
5 |
양환석, 양정모, "MANET에서 효율적 역추적을 위한 경로관리에 관한 연구," 디지털산업정보학회지, 제7권, 제4호, 2011, pp. 31-37.
|
6 |
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," Proceedings of the third international symposium on Information processing in sensor networks. New York, NY, USA: ACM Press, 2004, pp. 259-268.
|
7 |
I. M. Atakli, H. Hu, Y. Chen, W. -S. Ku and Z. Su, "Mali-cious Node Detection in Wireless Sensor Networks Using Weighted Trust Evaluation," Proceedings of Spring Simulation Multiconference, Ottawa, 14-17 April 2008, pp. 836-843.
|
8 |
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attack and Countermeasures," Journal of Ad Hoc Networks, Vol. 1, No. 2, 2003, pp. 293-315.
DOI
ScienceOn
|
9 |
L. Ju, H. Li, Y. Liu, W. Xue, K. Li and Z. Chi, "An Improved Intrusion Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks," Proceedings of the 5th International Conference on Ubiquitous Information Technology and Applications (CUTE), Sanya, 16-18 December 2010, pp. 1-6.
|