DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks
暂无分享,去创建一个
Chadi Assi | Yinghua Ye | Lei Guang | C. Assi | Lei Guang | Y. Ye
[1] John S. Baras,et al. Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.
[2] Chadi Assi,et al. Vulnerabilities of ad hoc network routing protocols to MAC misbehavior , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[3] Azzedine Boukerche,et al. Wireless Communication and Mobile Computing , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.
[4] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[5] Chadi Assi,et al. On the resiliency of mobile ad hoc networks to MAC layer misbehavior , 2005, PE-WASUN '05.
[6] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[7] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[8] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[9] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[10] Jianhua Liu,et al. Differential space-time modulation for DS-CDMA systems , 2002, Wirel. Commun. Mob. Comput..
[11] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[12] Chadi Assi,et al. Modeling and analysis of predictable random backoff in selfish environments , 2006, MSWiM '06.
[13] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[14] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[15] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.