Overcoming misbehavior in mobile ad hoc networks: an overview
暂无分享,去创建一个
Leandros Tassiulas | George Athanasiou | Gregory S. Yovanof | L. Tassiulas | G. Yovanof | G. Athanasiou
[1] Levente Buttyán,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.
[2] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[3] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[4] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[5] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[6] Luís E. T. Rodrigues,et al. Friends and foes: preventing selfishness in open mobile ad hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[7] Stephan Eidenbenz,et al. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.
[8] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[9] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[10] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[11] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[12] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[13] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[14] Nj Piscataway,et al. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .
[15] John S. Baras,et al. Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.
[16] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[17] Hugo M. Miranda. Preventing selfishness in open mobile ad hoc networks , 2002 .
[18] Alex C. Snoeren,et al. Priority Forwarding in Ad Hoc Networks with Self-Interested Parties , 2003 .
[19] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[20] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.