Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots
暂无分享,去创建一个
[1] J. S. Shah,et al. Effect of MAC layer protocol in building trust and reputation scheme in mobile ad hoc network , 2013, 2013 Nirma University International Conference on Engineering (NUiCONE).
[2] Sang Kyu Lee,et al. Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[3] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[4] Soufiene Djahel,et al. Fast and Efficient Countermeasure for MAC Layer Misbehavior in MANETs , 2012, IEEE Wireless Communications Letters.
[5] Min-Shiang Hwang,et al. Using Smart Card to Achieve a Single Sign-on for Multiple Cloud Services , 2013 .
[6] Bülent Tavli,et al. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009, Comput. Stand. Interfaces.
[7] V. A. Kumar,et al. Simulation and analysis of RTS/CTS DoS attack variants in 802.11 networks , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.
[8] BicakciKemal,et al. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009 .
[9] Chadi Assi,et al. Enhancing IEEE 802.11 Random Backoff in Selfish Environments , 2008, IEEE Transactions on Vehicular Technology.
[10] Dimitris Kanellopoulos,et al. MAC layer misbehavior in MANETs , 2013 .
[11] Chadi Assi,et al. Mitigating Smart Selfish MAC Layer Misbehavior in Ad Hoc Networks , 2006, 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[12] John S. Baras,et al. Performance evaluation and trade-offs of optimal back-off misbehavior detection schemes in wireless networks in the presence of interference , 2008, VALUETOOLS.
[13] Lili Qiu,et al. Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection , 2010, IEEE Transactions on Dependable and Secure Computing.
[14] Gunasekaran Raja,et al. A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks , 2009, Journal of Computer Science and Technology.