Detection and mitigation of misbehavior in cooperative wireless communications
暂无分享,去创建一个
[1] H.T. Sencar,et al. Cooperative diversity in the presence of a misbehaving relay : Performance analysis , 2007, 2007 IEEE Sarnoff Symposium.
[2] Nasir D. Memon,et al. Cooperative diversity with selfish users , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[3] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[4] S. Tomasin,et al. Detection of Selfish Partners by Control Packets in ARQ-Based CSMA Cooperative Networks , 2008, 2008 IEEE 10th International Symposium on Spread Spectrum Techniques and Applications.
[5] Elza Erkip,et al. User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..
[6] Zhu Han,et al. Multi-node cooperative resource allocation to improve coverage area in wireless networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[7] Nasir D. Memon,et al. Modeling Misbehavior in Cooperative Diversity: A Dynamic Game Approach , 2009, EURASIP J. Adv. Signal Process..
[8] M. Nowak,et al. Evolution of indirect reciprocity , 2005, Nature.
[9] Yuhong Yang. Elements of Information Theory (2nd ed.). Thomas M. Cover and Joy A. Thomas , 2008 .
[10] Shalinee Kishore,et al. A Game-Theoretic Analysis of Decode-and-Forward Cooperation in Rayleigh Fading Channels , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[11] Nasir D. Memon,et al. Detecting Malicious Behavior in Cooperative Diversity , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[12] E. Lehmann. Testing Statistical Hypotheses , 1960 .
[13] Elza Erkip,et al. User cooperation diversity. Part II. Implementation aspects and performance analysis , 2003, IEEE Trans. Commun..
[14] Margaret M. Blair,et al. Trust, Trustworthiness, and the Behavioral Foundations of Corporate Law , 2001 .
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] Pietro Michiardi,et al. Game theoretic analysis of security in mobile ad hoc networks , 2002 .
[17] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory, Part I , 1968 .
[18] X. Rong Li,et al. Sequential detection of targets in multichannel systems , 2003, IEEE Trans. Inf. Theory.
[19] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[20] Leonard E. Miller,et al. Distribution of Link Distances in a Wireless Network , 2001, Journal of research of the National Institute of Standards and Technology.
[21] Sathya Narayanan,et al. CoopMAC: A Cooperative MAC for Wireless LANs , 2007, IEEE Journal on Selected Areas in Communications.
[22] Min Wu,et al. Security Issues in Cooperative Communications: Tracing Adversarial Relays , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[23] David M. Kreps,et al. Sequential Equilibria Author ( s ) : , 1982 .
[24] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[25] J. Nicholas Laneman,et al. Cooperative diversity in wireless networks: algorithms and architectures , 2002 .
[26] Marco Levorato,et al. Analysis of Outage Probability for Cooperative Networks with HARQ , 2007, 2007 IEEE International Symposium on Information Theory.
[27] Yeheskel Bar-Ness,et al. Diversity combining with imperfect channel estimation , 2005, IEEE Transactions on Communications.
[28] Roger B. Myerson,et al. Game theory - Analysis of Conflict , 1991 .
[29] Mohamed-Slim Alouini,et al. Digital Communication over Fading Channels: Simon/Digital Communications 2e , 2004 .
[30] Jean-Pierre Hubaux,et al. Game Theory in Wireless Networks: A Tutorial , 2006 .
[31] K. Cook. Trust in Society , 2001 .
[32] Gerhard Fettweis,et al. Relay-based deployment concepts for wireless and mobile broadband radio , 2004, IEEE Communications Magazine.
[33] N. Memon,et al. Detection of misbehavior in cooperative diversity , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[34] Norman C. Beaulieu,et al. On first-order Markov modeling for the Rayleigh fading channel , 2000, IEEE Trans. Commun..
[35] N. Memon,et al. Cooperative diversity as a dynamic game with incomplete information , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[36] Aria Nosratinia,et al. Cooperative communication in wireless networks , 2004, IEEE Communications Magazine.
[37] S. Buchegger,et al. Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[38] John G. Proakis,et al. Digital Communications , 1983 .
[39] Desmond P. Taylor,et al. On the irreducible error floor in fast fading channels , 2000, IEEE Trans. Veh. Technol..
[40] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[41] Raviraj S. Adve,et al. Stimulating Cooperative Diversity in Wireless Ad Hoc Networks through Pricing , 2006, 2006 IEEE International Conference on Communications.
[42] W. Hamilton,et al. The evolution of cooperation. , 1984, Science.
[43] Helmut Bölcskei,et al. Fading relay channels: performance limits and space-time signal design , 2004, IEEE Journal on Selected Areas in Communications.
[44] Vivek P. Mhatre,et al. WiMAX relay networks: opportunistic scheduling to exploit multiuser diversity and frequency selectivity , 2008, MobiCom '08.
[45] John S. Baras,et al. Application of sequential detection schemes for obtaining performance bounds of greedy users in the IEEE 802.11 MAC , 2008, IEEE Communications Magazine.
[46] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[47] David J. Goodman,et al. Power control for wireless data , 1999, 1999 IEEE International Workshop on Mobile Multimedia Communications (MoMuC'99) (Cat. No.99EX384).
[48] R. Srikant,et al. DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.
[49] Xiaodong Wang,et al. Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.
[50] Lee Trepanier,et al. Trust in Society , 2004 .
[51] J. Hofbauer,et al. Evolutionary game dynamics , 2011 .
[52] Nasir D. Memon,et al. A dynamic game model for Amplify-and-Forward cooperative communications , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[53] Mia Hubert,et al. LIBRA: a MATLAB library for robust analysis , 2005 .
[54] P. Kollock. SOCIAL DILEMMAS: The Anatomy of Cooperation , 1998 .
[55] R. Gibbons. An Introduction to Applicable Game Theory , 1997 .
[56] Nasir D. Memon,et al. A Stochastic Model for Misbehaving Relays in Cooperative Diversity , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[57] Narayan B. Mandayam,et al. Pricing for enabling forwarding in self-configuring ad hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[58] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[59] M. Nowak. Five Rules for the Evolution of Cooperation , 2006, Science.