A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks
暂无分享,去创建一个
[1] Jaewoo Chung,et al. Mobile Computing Systems and Applications , 2011, IEEE Pervasive Comput..
[2] Srdjan Krco,et al. Improved neighbor detection algorithm for AODV routing protocol , 2003, IEEE Communications Letters.
[3] Ian Witten,et al. Data Mining , 2000 .
[4] Mingzeng Hu,et al. A Survey of Secure Routing in Ad Hoc Networks , 2008, 2008 The Ninth International Conference on Web-Age Information Management.
[5] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[6] Shusaku Tsumoto,et al. Visualization of rule's similarity using multidimensional scaling , 2003, Third IEEE International Conference on Data Mining.
[7] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Saurabh Ganeriwal,et al. On Cheating in CSMA/CA Ad Hoc Networks , 2004 .
[9] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[10] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[11] András Faragó. Scalable analysis and design of ad hoc networks via random graph theory , 2002, DIALM '02.
[12] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[13] Mukesh Singhal,et al. Hello protocols for ad-hoc networks: overhead and accuracy tradeoffs , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[14] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.