{"created":"2023-06-20T12:57:17.767790+00:00","id":1334,"links":{},"metadata":{"_buckets":{"deposit":"71fa3331-5411-404e-8ff0-75ea28b79bc1"},"_deposit":{"created_by":2,"id":"1334","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"1334"},"status":"published"},"_oai":{"id":"oai:fun.repo.nii.ac.jp:00001334","sets":["22:33","25:26:52"]},"author_link":["96","2461","33"],"item_9_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2008-09","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"28","bibliographicPageStart":"24","bibliographic_titles":[{"bibliographic_title":"International Workshop on Informatics, IWIN2008"}]}]},"item_9_description_3":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"It is reported that there have been several attacks on MANET networks. Furthermore, several intrusion detection systems (IDSs) for MANET are being discussed. However, as the IDS is not a perfect system, it may mistake a normal node for a malicious one. It is important that a node can prove accurate information on the communication status (ex. relaying packets) to a third person. In other words, studying MANET forensics is essential. We first define the MANET forensics model, and propose which contents should be collected as evidence of an attack, and the method of retrieving evidence packets from the witness node. Furthermore, we implemented a prototype system on the basis of the proposed method, and evaluated the performance, using the network simulator. Finally, we conclude that our proposal is suitable for MANET forensics and discuss the subject of future research.","subitem_description_type":"Abstract"}]},"item_9_publisher_17":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Informatics Society"}]},"item_9_select_10":{"attribute_name":"単著共著","attribute_value_mlt":[{"subitem_select_item":"共著/joint"}]},"item_9_select_8":{"attribute_name":"査読有無","attribute_value_mlt":[{"subitem_select_item":"あり/yes"}]},"item_9_select_9":{"attribute_name":"研究業績種別","attribute_value_mlt":[{"subitem_select_item":"国際会議/International Conference"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"metadata only access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_14cb"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Otaka, Akira"}],"nameIdentifiers":[{"nameIdentifier":"2461","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Takagi, Tsuyoshi"}],"nameIdentifiers":[{"nameIdentifier":"96","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60404802","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=60404802"}]},{"creatorNames":[{"creatorName":"Takahashi, Osamu"}],"nameIdentifiers":[{"nameIdentifier":"33","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60381282","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=60381282"}]}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"A Proposal of Reliable Transmission Records Collection Method for MANET Forensics, and its Evaluation","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"A Proposal of Reliable Transmission Records Collection Method for MANET Forensics, and its Evaluation"}]},"item_type_id":"9","owner":"2","path":["33","52"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-04-18"},"publish_date":"2011-04-18","publish_status":"0","recid":"1334","relation_version_is_last":true,"title":["A Proposal of Reliable Transmission Records Collection Method for MANET Forensics, and its Evaluation"],"weko_creator_id":"2","weko_shared_id":-1},"updated":"2023-06-20T14:11:15.395580+00:00"}