Characterizing the greedy behavior in wireless ad hoc networks
暂无分享,去创建一个
Damla Turgut | Soufiene Djahel | Farid Naït-Abdesselam | D. Turgut | Farid Naït-Abdesselam | S. Djahel
[1] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[2] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[3] Lili Qiu,et al. Impact of Interference on Multi-Hop Wireless Network Performance , 2003, MobiCom '03.
[4] Soufiene Djahel,et al. A Fuzzy Logic Based Scheme to Detect Adaptive Cheaters in Wireless LAN , 2009, 2009 IEEE International Conference on Communications.
[5] Mario Gerla,et al. Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks , 2003, Ad Hoc Networks.
[6] John S. Baras,et al. Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.
[7] Gregory A. Hansen,et al. The Optimized Link State Routing Protocol , 2003 .
[8] Xiaodong Wang,et al. Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.
[9] John S. Baras,et al. Application of sequential detection schemes for obtaining performance bounds of greedy users in the IEEE 802.11 MAC , 2008, IEEE Communications Magazine.
[10] Sang Kyu Lee,et al. Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[11] F. Massey. The Kolmogorov-Smirnov Test for Goodness of Fit , 1951 .
[12] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[13] Chadi Assi,et al. Enhancing IEEE 802.11 Random Backoff in Selfish Environments , 2008, IEEE Transactions on Vehicular Technology.
[14] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[15] Akira Tanaka,et al. The worst-case time complexity for generating all maximal cliques and computational experiments , 2006, Theor. Comput. Sci..
[16] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[17] Akira Tanaka,et al. The Worst-Case Time Complexity for Generating All Maximal Cliques , 2004, COCOON.
[18] William C. Y. Lee,et al. Mobile Communications Engineering , 1982 .
[19] J. Andel. Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.
[20] Yu Wang,et al. Performance of collision avoidance protocols in single-channel ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[21] Brahim Bensaou,et al. Fair bandwidth sharing algorithms based on game theory frameworks for wireless ad-hoc networks , 2004, IEEE INFOCOM 2004.
[22] Leonard Kleinrock,et al. Optimal Transmission Ranges for Randomly Distributed Packet Radio Terminals , 1984, IEEE Trans. Commun..
[23] Martin Nilsson,et al. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[24] Saurabh Ganeriwal,et al. On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[25] Maxim Raya,et al. DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.