Hidden Problems with the Hidden Node Problem
暂无分享,去创建一个
[1] Mario Gerla,et al. Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks , 2003, Ad Hoc Networks.
[2] P. Karn,et al. MACA-a New Channel Access Method for Packet Radio , 1990 .
[3] David Starobinski,et al. RTS/CTS-induced congestion in ad hoc wireless LANs , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[4] Archan Misra,et al. MACA-P: a MAC for concurrent transmissions in multi-hop wireless networks , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[5] Pramod K. Varshney,et al. Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming , 2003 .
[6] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[7] Mario Gerla,et al. How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.