DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots
暂无分享,去创建一个
Maxim Raya | Jean-Pierre Hubaux | Imad Aad | Alaeddine El Fawal | J. Hubaux | I. Aad | M. Raya | A. E. Fawal
[1] Srinivasan Seshan,et al. Selfish behavior and stability of the internet:: a game-theoretic analysis of TCP , 2002, SIGCOMM '02.
[2] J.-Y. Le Boudec,et al. Toward self-organized mobile ad hoc networks: the terminodes project , 2001, IEEE Commun. Mag..
[3] George C. Polyzos,et al. TCP and UDP performance over a wireless LAN , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[4] Ramón Agüero,et al. Behavior of UDP-based applications over IEEE 802.11 wireless networks , 2001, 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. PIMRC 2001. Proceedings (Cat. No.01TH8598).
[5] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[6] H VaidyaNitin,et al. Selfish MAC Layer Misbehavior in Wireless Networks , 2005 .
[7] Hari Balakrishnan,et al. An analysis of short-term fairness in wireless media access protocols (poster session) , 2000, SIGMETRICS '00.
[8] Martin Heusse,et al. Performance anomaly of 802.11b , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[9] Markus Jakobsson,et al. A charging and rewarding scheme for packet forwarding in multi-hop cellular networks , 2003, MobiHoc '03.
[10] T. L. Lim,et al. SELECTED AREAS IN , 1985 .
[11] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[12] Magdalena Balazinska,et al. Characterizing mobility and network usage in a corporate wireless local-area network , 2003, MobiSys '03.
[13] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[14] William A. Arbaugh,et al. Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .
[15] Mary Baker,et al. Analysis of a local-area wireless network , 2000, MobiCom '00.
[16] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[17] Ray Jain,et al. The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.
[18] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[19] Vaduvur Bharghavan,et al. Achieving MAC layer fairness in wireless packet networks , 2000, MobiCom '00.
[20] Kevin R. Fall,et al. Ns: notes and documentation , 1997 .
[21] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[22] David Kotz,et al. Analysis of a Campus-Wide Wireless Network , 2002, MobiCom '02.
[23] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[24] Joe F. Chicharo,et al. Unfairness and capture behaviour in 802.11 adhoc networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.
[25] Saurabh Ganeriwal,et al. On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[26] Martin Heusse,et al. Short-Term Fairness of 802.11 Networks with Several Hosts , 2004, MWCN.
[27] Jerzy Konorski,et al. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations , 2002, NETWORKING.
[28] Madhav V. Marathe,et al. Analyzing the short-term fairness of IEEE 802.11 in wireless multi-hop radio networks , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.