DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, H | ko |
dc.contributor.author | Kim, D | ko |
dc.contributor.author | Kim, Sehun | ko |
dc.date.accessioned | 2007-11-20T07:31:41Z | - |
dc.date.available | 2007-11-20T07:31:41Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2006 | - |
dc.identifier.citation | AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, v.60, no.3, pp.248 - 250 | - |
dc.identifier.issn | 1434-8411 | - |
dc.identifier.uri | http://hdl.handle.net/10203/2056 | - |
dc.description.abstract | We propose a monitoring node selection scheme for intrusion detection in mobile ad hoc networks. Network survivability is an important issue in a mobile ad hoc network and the proposed scheme considers the remaining battery power of each node in selecting monitoring nodes to extend its lifetime. (c) 2005 Elsevier GrnbH. All rights reserved. | - |
dc.description.sponsorship | This work was sponsored in part by the Korean Ministry of Information and Communication under the University IT Research Center Project. | en |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | ELSEVIER GMBH | - |
dc.title | Lifetime-enhancing selection of monitoring nodes for intrusion detection in mobile ad hoc networks | - |
dc.type | Article | - |
dc.identifier.wosid | 000235846300010 | - |
dc.identifier.scopusid | 2-s2.0-32044461573 | - |
dc.type.rims | ART | - |
dc.citation.volume | 60 | - |
dc.citation.issue | 3 | - |
dc.citation.beginningpage | 248 | - |
dc.citation.endingpage | 250 | - |
dc.citation.publicationname | AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS | - |
dc.identifier.doi | 10.1016/j.aeue.2005.05.012 | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Sehun | - |
dc.contributor.nonIdAuthor | Kim, H | - |
dc.contributor.nonIdAuthor | Kim, D | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | battery | - |
dc.subject.keywordAuthor | network lifetime | - |
dc.subject.keywordAuthor | intrusion detection | - |
dc.subject.keywordAuthor | mobile ad hoc network | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.