Enhancing IEEE 802.11 Random Backoff in Selfish Environments
暂无分享,去创建一个
[1] Ray Jain,et al. The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.
[2] Kevin R. Fall,et al. Ns: notes and documentation , 1997 .
[3] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[4] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[5] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[6] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[7] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[8] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[9] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[10] Thierry Turletti,et al. Enhancing IEEE 802.11 MAC in congested environments , 2004 .
[11] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[12] Yihong Zhou,et al. Analyzing and Preventing MAC-Layer Denial of Service Attacks for Stock 802 . 11 Systems , 2004 .
[13] Pramod K. Varshney,et al. A New Backoff Algorithm for the IEEE 802.11 Distributed Coordination Function , 2004 .
[14] John S. Baras,et al. Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.
[15] Andrzej Duda,et al. Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless LANs , 2005, SIGCOMM '05.
[16] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[17] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[18] Saurabh Ganeriwal,et al. On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[19] Sheng Zhong,et al. On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques , 2005, MobiCom '05.
[20] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[21] Chadi Assi,et al. Interlayer Attacks in Mobile Ad Hoc Networks , 2006, MSN.
[22] Chadi Assi,et al. Modeling and analysis of predictable random backoff in selfish environments , 2006, MSWiM '06.
[23] Chadi Assi,et al. Mitigating Smart Selfish MAC Layer Misbehavior in Ad Hoc Networks , 2006, 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[24] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[25] Sheng Zhong,et al. On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks , 2006, Wirel. Networks.