A light-weight solution for selfish nodes problem considering battery status in wireless ad-hoc networks
暂无分享,去创建一个
[1] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[2] Pietro Michiardi,et al. Prevention of denial of service attacks and selfishness in mobile ad hoc networks , 2002 .
[3] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[4] J. Broch,et al. Dynamic source routing in ad hoc wireless networks , 1998 .
[5] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[6] Levente Buttyán,et al. Towards mobile ad-hoc WANs: terminodes , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[7] Dirk Westhoff,et al. Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[8] David R. Karger,et al. A scalable location service for geographic ad hoc routing , 2000, MobiCom '00.
[9] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[10] Hugo M. Miranda. Preventing selfishness in open mobile ad hoc networks , 2002 .
[11] Levente Buttyán,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.
[12] Stephan Eidenbenz,et al. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.
[13] Laura Marie Feeney,et al. An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks , 2001, Mob. Networks Appl..
[14] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[15] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[16] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[17] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[18] Klara Nahrstedt,et al. iPass: an incentive compatible auction scheme to enable packet forwarding service in MANET , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[19] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[20] FeeneyLaura Marie. An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks , 2001 .
[21] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.