A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks
暂无分享,去创建一个
[1] E. Kalai,et al. Rational Learning Leads to Nash Equilibrium , 1993 .
[2] Jiming Chen,et al. Promoting Device-to-Device Communication in Cellular Networks by Contract-based Incentive Mechanisms , 2017, IEEE Network.
[3] Szymon Szott,et al. Traffic Remapping Attacks in Ad Hoc Networks , 2018, IEEE Communications Magazine.
[4] Albert Banchs,et al. Detecting selfish configurations in 802.11 WLANs , 2010, IEEE Communications Letters.
[5] Pan Li,et al. MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense , 2015, IEEE Transactions on Mobile Computing.
[6] Feng Xia,et al. A Survey on Human-Centric Communications in Non-Cooperative Wireless Relay Networks , 2018, IEEE Communications Surveys & Tutorials.
[7] Daniel Camps-Mur,et al. SOLOR: Self-Optimizing WLANs With Legacy-Compatible Opportunistic Relays , 2015, IEEE/ACM Transactions on Networking.
[8] Kok-Lim Alvin Yau,et al. QoS in IEEE 802.11-based wireless networks: A contemporary review , 2014, J. Netw. Comput. Appl..
[9] Daniël Wedema. Games And Information An Introduction To Game Theory 3rd Edition , 2011 .
[10] Yiyang Pei,et al. Dynamic Contract Design for Cooperative Wireless Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[11] Szymon Szott. Selfish insider attacks in IEEE 802.11s wireless mesh networks , 2014, IEEE Communications Magazine.
[12] Szymon Szott,et al. Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures , 2018, IEEE Wireless Communications Letters.
[13] Xiaoying Gan,et al. A Contract-Based Incentive Mechanism for Delayed Traffic Offloading in Cellular Networks , 2016, IEEE Transactions on Wireless Communications.
[14] Jugal K. Kalita,et al. Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.