Detecting Selfish Behavior in a Cooperative Commons
暂无分享,去创建一个
[1] Khaled Ben Letaief,et al. Cooperative Communications for Cognitive Radio Networks , 2009, Proceedings of the IEEE.
[2] Marco Conti,et al. Mesh networks: commodity multihop ad hoc networks , 2005, IEEE Communications Magazine.
[3] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[4] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[5] Panganamala Ramana Kumar,et al. Capacity bounds for ad hoc and hybrid wireless networks , 2004, CCRV.
[6] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[7] D. Djenouri,et al. New approach for selfish nodes detection in mobile ad hoc networks , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..
[8] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[9] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[10] T. Fujii,et al. Ad-hoc cognitive radio - development to frequency sharing system by using multi-hop network , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[11] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[12] Younghwan Yoo,et al. Why does it pay to be selfish in a MANET? , 2006, IEEE Wireless Communications.
[13] Khaled Ben Letaief,et al. Joint Beamforming and Scheduling in Cognitive Radio Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[14] Steve Sheng,et al. Finding an Effective Sustainable Model for a Wireless Metropolitan-Area Network: Analyzing the Case of Pittsburgh , 2007 .
[15] Jon M. Peha,et al. Sharing Spectrum Through Spectrum Policy Reform and Cognitive Radio , 2009, Proceedings of the IEEE.
[16] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[17] J. Peha,et al. Emerging Technology and Spectrum Policy Reform , 2007 .
[18] Jean-Yves Le Boudec,et al. A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do? , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.
[19] A. Laouiti,et al. Optimized link state routing protocol for ad hoc networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..
[20] S. M. Heemstra de Groot,et al. Power-aware routing in mobile ad hoc networks , 1998, MobiCom '98.
[21] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[22] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[23] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[24] Pramod K. Varshney,et al. TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[25] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[26] Ratul Mahajan,et al. Sustaining cooperation in multi-hop wireless networks , 2005, NSDI.
[27] Yacine Rebahi,et al. A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).
[28] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.