KHO THƯ VIỆN 🔎

Handbook of information and communication security: Part 2

➤  Gửi thông báo lỗi    ⚠️ Báo cáo tài liệu vi phạm

Loại tài liệu:     PDF
Số trang:         454 Trang
Tài liệu:           ✅  ĐÃ ĐƯỢC PHÊ DUYỆT
 













Nội dung chi tiết: Handbook of information and communication security: Part 2

Handbook of information and communication security: Part 2

Mobile Ad Hoc Network Routing21Melody Moh and Ji LiContents21.1Chapter Overview........................40721.2One-Layer Reputation Systems for MANETRo

Handbook of information and communication security: Part 2outing..................................40b21.2.1Watchdog and Palhraler...........40821.2.2(X)RE: A <:ollaborativc ReputationMechanism................

........40921.2.3OCEAN: Observation Based Cooperation Enforcementin Ad Hoc Networks..............-10921.2.4SORI Secure and Objective Reputation-Based Handbook of information and communication security: Part 2

Incentive Schemefor Ad Hoc Networks.............-11021.2.5LARS Locally Aware ReputationSystem...........................41221.2.6Comparison of One-Lay

Handbook of information and communication security: Part 2

erReputation Systems ..............41221.3Two-Layer Reputation Systems (with Trust) -11221.3.1CONFIDANT Cooperation of Nodes: Fairness in DynamicAd Ho

Mobile Ad Hoc Network Routing21Melody Moh and Ji LiContents21.1Chapter Overview........................40721.2One-Layer Reputation Systems for MANETRo

Handbook of information and communication security: Part 21.3.4(Cooperative and Reltable PacketForwarding on Top of AODV........41521.3.5Comparison of Two LayerReputation Systems ..............41621.4Limitati

ons of Reputation Systemsin MANET* ..............................41721.4.1Limitations of Reputationand Trust Systems................41721.4.2Limitati Handbook of information and communication security: Part 2

onsin Cooperation Monitoring........41721.5Conclusion and Future Directions........419References....................................419The Authors....

Handbook of information and communication security: Part 2

...............................420Instant deployment without relying on an existing infrastructure makes mobile ad hoc networks (MANETs) an attractive

Mobile Ad Hoc Network Routing21Melody Moh and Ji LiContents21.1Chapter Overview........................40721.2One-Layer Reputation Systems for MANETRo

Handbook of information and communication security: Part 2cation and encryption are traditional protection mechanisms, yet they are ineffective against attacks such as selfish nodes and malicious packet dropp

ing. Recently, reputation systems have been proposed to enforce cooperation among nodes. These systems have provided useful countermeasures and have b Handbook of information and communication security: Part 2

een successful in dealing with selfish and malicious nodes. Uns chapter presents a survey of the major contributions in this field. We also discuss th

Handbook of information and communication security: Part 2

e limitations of those approaches and suggest possible solutions and future directions.

Mobile Ad Hoc Network Routing21Melody Moh and Ji LiContents21.1Chapter Overview........................40721.2One-Layer Reputation Systems for MANETRo

Mobile Ad Hoc Network Routing21Melody Moh and Ji LiContents21.1Chapter Overview........................40721.2One-Layer Reputation Systems for MANETRo

Gọi ngay
Chat zalo
Facebook