Detection of selfish & malicious behavior using DTN-chord monitoring in mobile networks
暂无分享,去创建一个
[1] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[2] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[3] Qinghua Li,et al. Routing in Socially Selfish Delay Tolerant Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[4] Ralf Steinmetz,et al. On the effect of node misbehavior in ad hoc networks , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[5] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[6] Lieguang Zeng,et al. The Impact of Node Selfishness on Multicasting in Delay Tolerant Networks , 2011, IEEE Transactions on Vehicular Technology.
[7] Juan-Carlos Cano,et al. CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes , 2015, IEEE Transactions on Mobile Computing.
[8] Shailender Gupta,et al. IMPACT OF SELFISH NODE CONCENTRATION IN MANET S , 2011 .
[9] David R. Karger,et al. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.
[10] Xuemin Shen,et al. ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multihop Wireless Networks , 2011, IEEE Transactions on Mobile Computing.
[11] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[12] Yu Zhang,et al. AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks , 2016, IEEE Transactions on Mobile Computing.
[13] Daniel M. Lewin,et al. Consistent hashing and random trees : algorithms for caching in distributed networks , 1998 .
[14] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[15] Levente Buttyán,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.
[16] Hongseok Yoo,et al. The controversy of Selfish nodes in ad hoc networks , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[17] Lien-Wen Wu,et al. A threshold-based method for selfish nodes detection in MANET , 2010, 2010 International Computer Symposium (ICS2010).
[18] Merkourios Karaliopoulos,et al. Assessing the vulnerability of DTN data relaying schemes to node selfishness , 2009, IEEE Communications Letters.
[19] M. Weber,et al. Sensors for Detection of Misbehaving Nodes in MANETs , 2004, PIK Prax. Informationsverarbeitung Kommun..
[20] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[21] Paolo Santi,et al. The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes , 2008, IEEE Transactions on Mobile Computing.
[22] Shadab Ahmed. Ad_Hoc on Demand Distance Vector Routing using MANET , 2017 .
[23] Younghwan Yoo,et al. A credit-payment scheme for packet forwarding fairness in mobile ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[24] Dirk Westhoff,et al. Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[25] Pietro Manzoni,et al. Evaluating the Usefulness of Watchdogs for Intrusion Detection in VANETs , 2010, 2010 IEEE International Conference on Communications Workshops.