Đang chuẩn bị liên kết để tải về tài liệu:
Handbook of information and communication security: Part 2

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

(BQ) The book is divided into 2 parts, part 1 from chapter 21 to chapter 38. This part includes the contents: Mobile ad hoc network routing, security for ad hoc networks, phishing attacks and countermeasures, chaos-based secure optical communications using semiconductor lasers, chaos applications in optical communications,.and other contents. | Mobile Ad Hoc Network Routing Melody Moh and Ji Li Contents 21.1 Chapter Overview. 407 21.2 One-Layer Reputation Systems for MANET Routing. 408 21.2.1 Watchdog and Pathrater.408 21.2.2 CORE A Collaborative Reputation Mechanism.409 21.2.3 OCEAN Observation-Based Cooperation Enforcement in Ad Hoc Networks.409 21.2.4 SORI - Secure and Objective Reputation-Based Incentive Scheme for Ad Hoc Networks.410 21.2.5 LARS - Locally Aware Reputation System.412 21.2.6 Comparison of One-Layer Reputation Systems .412 21.3 Two-Layer Reputation Systems with Trust 412 21.3.1 Confidant - Cooperation of Nodes Fairness in Dynamic Ad Hoc Networks .412 21.3.2 TAODV - Trusted AODV .413 21.3.3 SAFE Securing Packet Forwarding in Ad Hoc Networks.414 21.3.4 Cooperative and Reliable Packet Forwarding on Top of AODV.415 21.3.5 Comparison of Two-Layer Reputation Systems .416 21.4 Limitations of Reputation Systems inMANETs . . 417 21.4.1 Limitations of Reputation and Trust Systems.417 21.4.2 Limitations in Cooperation Monitoring.417 21.5 Conclusion and Future Directions. 419 References. 419 The Authors. 420 Instant deployment without relying on an existing infrastructure makes mobile ad hoc networks MANETs an attractive choice for many dynamic situations. However such flexibility comes with a consequence - these networks are much more vulnerable to attacks. Authentication and encryption are traditional protection mechanisms yet they are ineffective against attacks such as selfish nodes and malicious packet dropping. Recently reputation systems have been proposed to enforce cooperation among nodes. These systems have provided useful countermeasures and have been successful in dealing with selfish and malicious nodes. This chapter presents a survey of the major contributions in this field. We also discuss the limitations of these approaches and suggest possible solutions and future directions. 21.1 Chapter Overview A MANET is a temporary network formed by wireless mobile hosts without a presetup .

TÀI LIỆU LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.