Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach
暂无分享,去创建一个
[1] Jerzy Konorski,et al. A Game-Theoretic Study of CSMA/CA Under a Backoff Attack , 2006, IEEE/ACM Transactions on Networking.
[2] Szymon Szott,et al. A Game-Theoretic Approach to EDCA Remapping Attacks , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
[3] Marek Natkaniec,et al. A simple but accurate throughput model for IEEE 802.11 EDCA in saturation and non-saturation conditions , 2011, Comput. Networks.
[4] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[5] Albert Banchs,et al. Detecting selfish configurations in 802.11 WLANs , 2010, IEEE Communications Letters.
[6] Ilenia Tinnirello,et al. Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[7] Pavan Nuggehalli,et al. A Game-Theoretic Analysis of QoS in Wireless MAC , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[8] Elizabeth M. Belding-Royer,et al. FreeMAC: framework for multi-channel mac development on 802.11 hardware , 2008, PRESTO '08.
[9] Szymon Szott,et al. Impact of Contention Window Cheating on Single-Hop IEEE 802.11e MANETs , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[10] Athanasios D. Panagopoulos,et al. A survey on game theory applications in wireless networks , 2010, Comput. Networks.
[11] G. Hardin,et al. The Tragedy of the Commons , 1968, Green Planet Blues.
[12] Jean-Marie Gorce,et al. Coupled Simulation-Measurements Platform for the Evaluation of Frequency Reuse in the 2.45 GHz ISM Band for Multimode Nodes with Multiple Antennas , 2010, EURASIP J. Wirel. Commun. Netw..
[13] Marek Natkaniec,et al. BusySiMOn - A New Protocol for IEEE 802.11 EDCA-Based Ad-Hoc Networks with Hidden Nodes , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[14] Luca Vollero,et al. Throughput analysis and optimal configuration of 802.11e EDCA , 2006, Comput. Networks.
[15] Szymon Szott,et al. Detecting backoff misbehaviour in IEEE 802.11 EDCA , 2011, Eur. Trans. Telecommun..
[16] Philip D. Straffin,et al. Game theory and strategy , 1993 .
[17] Szymon Szott,et al. QoS Support in Multi-hop Ad-hoc Networks , 2010 .
[18] Adam Wolisz,et al. {TKN EDCA} Model for ns/2 , 2006 .
[19] Szymon Szott,et al. An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes , 2010, EURASIP J. Wirel. Commun. Netw..
[20] Giulio Iannello,et al. Frame dropping: A QoS mechanism for multimedia communications in WiFi hot spots , 2004, Workshops on Mobile and Wireless Networking/High Performance Scientific, Engineering Computing/Network Design and Architecture/Optical Networks Control and Management/Ad Hoc and Sensor Networks/Compil.
[21] Saurabh Ganeriwal,et al. On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[22] Susana Sargento,et al. Supporting QoS in Integrated Ad-Hoc Networks , 2011, Wirel. Pers. Commun..
[23] Szymon Szott,et al. Impact of Misbehaviour on QoS in Wireless Mesh Networks , 2009, Networking.
[24] Chadi Assi,et al. Enhancing IEEE 802.11 Random Backoff in Selfish Environments , 2008, IEEE Transactions on Vehicular Technology.
[25] Kang G. Shin,et al. Achieving efficient channel utilization and weighted fairness for data communications in IEEE 802.11 WLAN under the DCF , 2002, IEEE 2002 Tenth IEEE International Workshop on Quality of Service (Cat. No.02EX564).
[26] Luigi Fratta,et al. Performance evaluation and enhancement of the CSMA/CA MAC protocol for 802.11 wireless LANs , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.
[27] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[28] John S. Baras,et al. Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.
[29] Lukas Kunz,et al. Contention Based Access Misbehavior in WLAN Networks , 2005 .
[30] Stephen B. Wicker,et al. Selfish users in Aloha: a game-theoretic approach , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).
[31] Chadi Assi,et al. MAC layer misbehavior in wireless networks: challenges and solutions , 2008, IEEE Wireless Communications.
[32] Lin Chen,et al. Selfishness, Not Always A Nightmare: Modeling Selfish MAC Behaviors in Wireless Mobile Ad Hoc Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[33] Jie Zhang,et al. Game-Theoretic EDCA in IEEE 802.11e WLANs , 2008, 2008 IEEE 68th Vehicular Technology Conference.
[34] V. Georgiev. Using Game Theory to Analyze Wireless Ad Hoc Networks . ” , 2008 .