Thwarting selfish and malicious behavior in wireless networks
暂无分享,去创建一个
[1] J. Barney,et al. Commercialization of an ultra wideband precision asset location system , 2003, IEEE Conference on Ultra Wideband Systems and Technologies, 2003.
[2] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[3] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[4] Dawn Song,et al. Hash Visualization: a New Technique to improve Real-World Security , 1999 .
[5] Guevara Noubir,et al. Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.
[6] Srdjan Capkun,et al. Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels , 2006, IEEE Transactions on Dependable and Secure Computing.
[7] Anthony Ephremides,et al. Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks , 2001, Mob. Networks Appl..
[8] Qun Li,et al. Online power-aware routing in wireless Ad-hoc networks , 2001, MobiCom '01.
[9] Bowen Alpern,et al. Key Exchange Using 'Keyless Cryptography' , 1983, Inf. Process. Lett..
[10] Li Li,et al. Distributed topology control for power efficient operation in multihop wireless ad hoc networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[11] Mani B. Srivastava,et al. Optimizing Sensor Networks in the Energy-Latency-Density Design Space , 2002, IEEE Trans. Mob. Comput..
[12] Nitin H. Vaidya,et al. An energy efficient MAC protocol for wireless LANs , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[13] Philippe Bonnet,et al. Copenhagen , 2012 .
[14] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[15] Stephen B. Wicker,et al. Stability of multipacket slotted Aloha with selfish users and perfect information , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[16] Gaurav S. Sukhatme,et al. Networked Infomechanical Systems (NIMS) for Ambient Intelligence , 2005, Ambient Intelligence.
[17] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[18] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[19] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[20] Mani B. Srivastava,et al. A dynamic operating system for sensor nodes , 2005, MobiSys '05.
[21] Angelos D. Keromytis,et al. Efficient, DoS-resistant, secure key exchange for internet protocols , 2001, CCS '02.
[22] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[23] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[24] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[25] Christian Gehrmann,et al. Manual authentication for wireless devices , 2004 .
[26] Dennis Kügler,et al. "Man in the Middle" Attacks on Bluetooth , 2003, Financial Cryptography.
[27] Stephen Dohrmann,et al. Public-key Support for Collaborative Groups , 2002 .
[28] Jean-Pierre Hubaux,et al. Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues , 2002, MobiCom '02.
[29] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[30] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[31] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[32] M. F.,et al. Bibliography , 1985, Experimental Gerontology.
[33] Pierre A. Humblet,et al. A Distributed Algorithm for Minimum-Weight Spanning Trees , 1983, TOPL.
[34] Srdjan Capkun,et al. Key Agreement in Peer-to-Peer Wireless Networks , 2006, Proceedings of the IEEE.
[35] Saurabh Ganeriwal,et al. On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[36] Jaap-Henk Hoepman. The Ephemeral Pairing Problem , 2004, Financial Cryptography.
[37] Jerzy Konorski,et al. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations , 2002, NETWORKING.
[38] Srdjan Capkun,et al. Secure Localization with Hidden and Mobile Base Stations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[39] Leandros Tassiulas,et al. Energy conserving routing in wireless ad-hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[40] Deborah Estrin,et al. Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.
[41] Frank Stajano,et al. Security for Ubiquitous Computing , 2002, ICISC.
[42] Dorit S. Hochba,et al. Approximation Algorithms for NP-Hard Problems , 1997, SIGA.
[43] Vijay V. Vazirani,et al. Approximation Algorithms , 2001, Springer Berlin Heidelberg.
[44] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[45] J. Martin Borden. Optimal Asymmetric Error Detecting Codes , 1982, Inf. Control..
[46] Ravi Mazumdar,et al. Hybrid sensor networks: a small world , 2005, MobiHoc '05.
[47] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[48] Fulu Li,et al. On minimum-energy broadcasting in all-wireless networks , 2001, Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks.
[49] Mario Blaum,et al. On t-Error Correcting/All Unidirectional Error Detecting Codes , 1989, IEEE Trans. Computers.
[50] Rachid El Azouzi,et al. Slotted Aloha as a Stochastic Game with Partial Information , 2003 .
[51] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[52] Srdjan Capkun,et al. Mobility helps peer-to-peer security , 2006, IEEE Transactions on Mobile Computing.
[53] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[54] Niki Pissinou,et al. Efficient solutions to multicast routing in communication networks , 1996, Mob. Networks Appl..
[55] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[56] S. Sastry. Nonlinear Systems: Analysis, Stability, and Control , 1999 .
[57] T. Gonzalez,et al. Minimum-energy Broadcast in Simple Graphs with Limited Node Power , 2007 .
[58] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[59] Xiang-Yang Li,et al. Minimum-energy broadcast routing in static ad hoc wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[60] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[61] Srdjan Capkun,et al. Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .
[62] Jean-Pierre Hubaux,et al. Key agreement over a radio link , 2004 .
[63] Jean-Pierre Hubaux,et al. Energy-Efficient Broadcasting in All-Wireless Networks , 2005, Wirel. Networks.
[64] Jean-Pierre Hubaux,et al. Multi-radio channel allocation in competitive wireless networks , 2006, 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06).
[65] Brian D. Noble,et al. Protecting applications with transient authentication , 2003, MobiSys '03.
[66] Weifa Liang,et al. Constructing minimum-energy broadcast trees in wireless ad hoc networks , 2002, MobiHoc '02.
[67] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[68] Ariel Orda,et al. Competitive routing in multi-user communication networks , 1993, IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings.
[69] M. R. Rao,et al. Combinatorial Optimization , 1992, NATO ASI Series.
[70] Richard J. La,et al. Optimal routing control: repeated game approach , 2002, IEEE Trans. Autom. Control..
[71] Cem U. Saraydar,et al. Efficient power control via pricing in wireless data networks , 2002, IEEE Trans. Commun..
[72] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[73] David Lichtenstein,et al. Planar Formulae and Their Uses , 1982, SIAM J. Comput..
[74] Catherine Rosenberg,et al. A game theoretic framework for bandwidth allocation and pricing in broadband networks , 2000, TNET.
[75] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[76] Eitan Altman,et al. CDMA Uplink Power Control as a Noncooperative Game , 2002, Wirel. Networks.
[77] Suresh Singh,et al. Power-Aware Broadcasting in Mobile Ad Hoc Networks∗ , 1999 .
[78] Ronald L. Rivest,et al. Introduction to Algorithms, Second Edition , 2001 .
[79] Jens Vygen,et al. The Book Review Column1 , 2020, SIGACT News.
[80] Tor Helleseth,et al. Workshop on the theory and application of cryptographic techniques on Advances in cryptology , 1994 .
[81] Teresa H. Meng,et al. Minimum energy mobile wireless networks , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).
[82] Claude Castelluccia,et al. Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.
[83] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[84] Rita H. Wouhaybi,et al. Incentive engineering in wireless LAN based access networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[85] Anthony Ephremides,et al. Energy-Efficient Broadcast and Multicast Trees in Wireless Networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[86] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[87] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[88] Ariel Orda,et al. Architecting noncooperative networks , 1995, Eighteenth Convention of Electrical and Electronics Engineers in Israel.
[89] Márton Nagy,et al. Multicast scheduling algorithms in mobile networks , 1998, Cluster Computing.
[90] George Kesidis,et al. Equilibria of a noncooperative game for heterogeneous users of an ALOHA network , 2002, IEEE Communications Letters.
[91] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[92] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[93] Andrea E. F. Clementi,et al. On the Complexity of Computing Minimum Energy Consumption Broadcast Subgraphs , 2001, STACS.
[94] Kaisa Nyberg,et al. Enhancements to Bluetooth Baseband Security , 2007 .
[95] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[96] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[97] Hugo Krawczyk,et al. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.
[98] András Faragó,et al. Algorithmic Problems in Power-Controlled Ad Hoc Networks , 2001, PDCS.