Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lim, Ji Hun | - |
dc.contributor.author | Lim, Keun Woo | - |
dc.contributor.author | Ko, Young Bae | - |
dc.date.issued | 2018-01-01 | - |
dc.identifier.issn | 1867-8211 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/36243 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85045212098&origin=inward | - |
dc.description.abstract | This paper proposes a mutual node evaluation method in mobile ad hoc networks to recognize and reliably remove attacker nodes from deteriorating the network. We focus on a tactical networking environment, where the network is generally maintained in harsh and hostile areas while the applications require stringent service requirements. In these kinds of environments, it is desirable to utilize proactive routing methods such as Optimized Link State Routing (OLSR). However, OLSR have weaknesses against various security attacks. To solve this problem, we provide a trust-based evaluation approach where node evaluate each other based on the packet forwarding capabilities. We prove the performance of our proposed method through NS-3. | - |
dc.description.sponsorship | Acknowledgement. This research was supported in part by the MIST (Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP (Institute for Information & communications Technology Promotion) (20150009080031001), and Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2015R1D1A1A01059049). | - |
dc.description.sponsorship | This research was supported in part by the MIST (Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP (Institute for Information & communications Technology Promotion) (20150009080031001), and Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2015R1D1A1A01059049). | - |
dc.language.iso | eng | - |
dc.publisher | Springer Verlag | - |
dc.subject.mesh | Evaluation approach | - |
dc.subject.mesh | Networking environment | - |
dc.subject.mesh | Optimized Link State Routing | - |
dc.subject.mesh | Packet forwarding | - |
dc.subject.mesh | Proactive routing | - |
dc.subject.mesh | Service requirements | - |
dc.subject.mesh | Tactical network | - |
dc.subject.mesh | Trust-based routing | - |
dc.title | Reliable mutual node evaluation for trust-based OLSR in tactical MANETs | - |
dc.type | Conference | - |
dc.citation.conferenceDate | 2017.12.16. ~ 2017.12.17. | - |
dc.citation.conferenceName | 13th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2017 | - |
dc.citation.edition | Quality, Reliability, Security and Robustness in Heterogeneous Systems - 13th International Conference, QShine 2017, Proceedings | - |
dc.citation.endPage | 119 | - |
dc.citation.startPage | 114 | - |
dc.citation.title | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | - |
dc.citation.volume | 234 LNICST | - |
dc.identifier.bibliographicCitation | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Vol.234 LNICST, pp.114-119 | - |
dc.identifier.doi | 10.1007/978-3-319-78078-8_12 | - |
dc.identifier.scopusid | 2-s2.0-85045212098 | - |
dc.identifier.url | http://www.springer.com/series/8197 | - |
dc.subject.keyword | Mobile ad hoc networks | - |
dc.subject.keyword | Optimized link state routing | - |
dc.subject.keyword | Tactical networks | - |
dc.subject.keyword | Trust-based routing | - |
dc.type.other | Conference Paper | - |
dc.description.isoa | false | - |
dc.subject.subarea | Computer Networks and Communications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.