Physical Integrity Check in Cooperative Relay Communications
暂无分享,去创建一个
[1] Aria Nosratinia,et al. Coded cooperation in wireless communications: space-time transmission and iterative decoding , 2004, IEEE Transactions on Signal Processing.
[2] Guiling Wang,et al. Lightweight and Compromise-Resilient Message Authentication in Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[3] Michael Gastpar,et al. Cooperative strategies and capacity theorems for relay networks , 2005, IEEE Transactions on Information Theory.
[4] Sang Wu Kim,et al. Error probability in multi-source, multi-relay networks under falsified data injection attacks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[5] H.T. Sencar,et al. Cooperative diversity in the presence of a misbehaving relay : Performance analysis , 2007, 2007 IEEE Sarnoff Symposium.
[6] D. Rajan. Probability, Random Variables, and Stochastic Processes , 2017 .
[7] R. Gallager. Principles of Digital Communication , 2008 .
[8] Wan-Jen Huang,et al. Misbehavior Detection Without Channel Information in Cooperative Networks , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).
[9] Baochun Li,et al. Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.
[10] Stefano Tomasin. Consensus-Based Detection of Malicious Nodes in Cooperative Wireless Networks , 2011, IEEE Communications Letters.
[11] Min Wu,et al. Tracing Malicious Relays in Cooperative Wireless Communications , 2007, IEEE Transactions on Information Forensics and Security.
[12] Stefano Tomasin,et al. Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ , 2010, IEEE Transactions on Wireless Communications.
[13] Athanasios Papoulis,et al. Probability, Random Variables and Stochastic Processes , 1965 .
[14] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[15] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[16] Nasir D. Memon,et al. Detecting Malicious Behavior in Cooperative Diversity , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[17] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[18] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[19] N. Memon,et al. Detection of misbehavior in cooperative diversity , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[20] Mihail L. Sichitiu,et al. Simple, accurate time synchronization for wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[21] Panagiotis Papadimitratos,et al. Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[22] J. Elson,et al. Fine-grained network time synchronization using reference broadcasts , 2002, OSDI '02.
[23] Xiaodong Wang,et al. Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.
[24] Muriel Médard,et al. An algebraic watchdog for wireless network coding , 2009, 2009 IEEE International Symposium on Information Theory.
[25] Sang Wu Kim,et al. Check-Sum Aided MAP Detection of Relay Misbehavior in Wireless Network Coding , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[26] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.