• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 33 / 102 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) Ad-hoc ³×Æ®¿öÅ©¿¡¼­ ¾ÇÀÇÀû ³ëµå °ü¸®±â¹ý¿¡ °üÇÑ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A study on Management Mechanism of Malicious Node in Ad-hoc Networks
ÀúÀÚ(Author) ±èÀϵµ   ±èµ¿Ãµ   Il-do Kim   Dong-cheon Kim  
¿ø¹®¼ö·Ïó(Citation) VOL 14 NO. 12 PP. 2716 ~ 2723 (2010. 12)
Çѱ۳»¿ë
(Korean Abstract)
Ad-hoc ³×Æ®¿öÅ©°¡ Á¤»óÀûÀ¸·Î µ¿ÀÛÇϱâ À§Çؼ­´Â °¢ ³ëµå°¡ µ¿µîÇÑ ±ÇÇÑÀ» °®°í »óÈ£ ÇùÁ¶ÇÒ ¶§ ¿øÈ°ÇÑ Åë½ÅÀÌ °¡´ÉÇÏ´Ù. ½Å·Ú¼ºÀ» È®º¸Çϱâ À§ÇØ ÀÎÁõµÈ ³ëµå·Î¸¸ ³×Æ®¿öÅ©°¡ ±¸¼ºÀÌ °¡´ÉÇÏÁö¸¸ ÀÎÁõ¸¸À¸·Î ¾ÇÀÇÀû ÇàÀ§¸¦ ÇÏ´Â ³ëµå¸¦ ¿ÏÀüÈ÷ ¹èÁ¦ÇÒ ¼ö ¾øÀ¸¹Ç·Î À̵éÀÇ ÇàÀ§°¡ ³×Æ®¿öÅ© Àüü¸¦ À§Çè¿¡ ºü¶ß¸± ¼ö ÀÖ´Ù. À̸¦ ŽÁö ¹× ¹èÁ¦Çؾ߸¸ ´õ¿í ¾ÈÀüÇÏ°í ½Å·ÚÇÒ ¼ö ÀÖ´Â ³×Æ®¿öÅ©¸¦ À¯ÁöÇÒ ¼ö ÀÖÀ¸³ª ÀÌ¿¡ ´ëÇÑ ¿¬±¸´Â »ó´ëÀûÀ¸·Î ¹ÌÈíÇÑ ¼öÁØÀÌ´Ù. µû¶ó¼­ ½Å·Ú °ü°è¿¡ ÀÖ´Â ³ëµå·Î ±¸¼ºµÈ ³×Æ®¿öÅ©¿¡¼­ À̱âÀûÀ̰ųª ¾ÇÀÇÀûÀÎ ³ëµå¸¦ ŽÁöÇÏ°í ¹èÁ¦½ÃÄÑ °á°úÀûÀ¸·Î ³×Æ®¿öÅ©ÀÇ ¾ÈÀü¼º°ú ½Å·Ú¼ºÀ» À¯ÁöÇÏ°í ó¸®À²À» Çâ»ó½Ãų ¼ö ÀÖ´Â ¹æ¹ýÀ» Á¦¾ÈÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
An Ad-hoc network will operate properly and provide smooth communication when nodes cooperate mutually with each of them having equal authority. Although it is possible to form a network consisting only of authenticated nodes in order to ensure reliability, authentication by itself is not sufficient to remove malicious nodes and their activities jeopardizing the whole network. Detection and prevention of such activities are vital for maintaining a safe and reliable network, but research on this matter is relatively lacking. Hence a suggestion is made on how to detect and prevent malicious or uncooperative ones among the nodes forming a network by a relationship of mutual trust, thereby maintaining safety and stability of the network and improving its processing abilities
Å°¿öµå(Keyword) Ad-hoc ³×Æ®¿öÅ©   ¾ÇÀÇÀû ³ëµå   Ad-hoc network   malicious nodes  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå