How MIMO cross-layer design enables QoS while detecting non-cooperative nodes in wireless multi-hop networks
暂无分享,去创建一个
[1] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[2] Abderrahim Benslimane,et al. Cross-Layer Approach to Improve the Monitoring Process for Mobile Ad Hoc Networks Based on IEEE 802.11 , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[3] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[4] Hakim Badis. An efficient bandwidth guaranteed routing for ad hoc networks using ieee 802.11 with interference consideration , 2007, MSWiM '07.
[5] Maxim Raya,et al. DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.
[6] Haiying Shen,et al. Analysis of a Hybrid Reputation Management System for Mobile Ad hoc Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[7] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[8] Bruno Schulze,et al. RETENTION: A reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments , 2013, J. Netw. Comput. Appl..
[9] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[10] Mourad Debbabi,et al. A Secure Mechanism Design-Based and Game Theoretical Model for MANETs , 2010, Mob. Networks Appl..
[11] Valeria Simoncini,et al. Variable Accuracy of Matrix-Vector Products in Projection Methods for Eigencomputation , 2005, SIAM J. Numer. Anal..
[12] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[13] Yu Cheng,et al. Selfish misbehavior detection in 802.11 based wireless networks: An adaptive approach based on Markov decision process , 2013, 2013 Proceedings IEEE INFOCOM.
[14] J.-P. Hubaux,et al. Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.
[15] Abderrahim Benslimane,et al. Cross-Layer approach to improve the monitoring process for Mobile Ad Hoc Networks based on , 2007 .
[16] Levente Buttyán,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.
[17] Abderrahmane Baadache,et al. Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..
[18] Jean C. Walrand,et al. Bandwidth guaranteed routing for ad-hoc networks with interference consideration , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).
[19] Yiwei Thomas Hou,et al. On the Asymptotic Capacity of Multi-Hop MIMO Ad Hoc Networks , 2011, IEEE Transactions on Wireless Communications.
[20] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[21] L. Lovász. A Characterization of Perfect Graphs , 1972 .
[22] Piet Van Mieghem,et al. Degree distribution and hopcount in wireless ad-hoc networks , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..
[23] Abderrahim Benslimane,et al. Toward a cross-layer monitoring process for mobile ad hoc networks , 2009, Secur. Commun. Networks.
[24] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[25] Abderrezak Rachedi,et al. MIMODog: How to solve the problem of selfish misbehavior detection mechanism in MANETs using MIMO technology , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[26] Mario Gerla,et al. SPACE-MAC: enabling spatial reuse using MIMO channel-aware MAC , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[27] Lavy Libman,et al. Conflicts and Incentives in Wireless Cooperative Relaying: A Distributed Market Pricing Framework , 2011, IEEE Transactions on Parallel and Distributed Systems.
[28] Sheng Zhong,et al. A reputation system for wireless mesh networks using network coding , 2011, J. Netw. Comput. Appl..