Cooperation in open, decentralized, and heterogeneous computer networks
暂无分享,去创建一个
[1] M. Hauge,et al. Multi-Topology routing for QoS support in the CoNSIS convoy MANET , 2012, 2012 Military Communications and Information Systems Conference (MCC).
[2] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[3] Leandro Navarro-Moldes,et al. Tight bounds for sketches in traffic validation , 2017, 2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC).
[4] Panagiotis Papadimitratos,et al. Toward a Taxonomy and Attacker Model for Secure Routing Protocols , 2017, CCRV.
[5] A. Zakrzewska,et al. Performance Study of Routing Protocols for Wireless Mesh Networks , 2008, 2008 19th International Conference on Systems Engineering.
[6] Bart Braem,et al. A questionnaire based examination of community networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[7] J. J. Garcia-Luna-Aceves,et al. Securing distance-vector routing protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[8] Mukesh Singhal,et al. Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[9] Prasant Mohapatra,et al. QuRiNet: A wide-area wireless mesh testbed for research and experimental evaluations , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).
[10] Suman Banerjee,et al. A measurement study of a commercial-grade urban wifi mesh , 2008, IMC '08.
[11] Prasant Mohapatra,et al. Comparing simulation tools and experimental testbeds for wireless mesh networks , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[12] Bernhard Plattner,et al. Routing Metrics for Wireless Mesh Networks , 2009, Guide to Wireless Mesh Networks.
[13] Zoltán Horváth,et al. Motivations, Design and Business Models of Wireless Community Networks , 2008, Mob. Networks Appl..
[14] Boon-Chong Seet,et al. The Handbook of Ad Hoc Wireless Networks , 2002 .
[15] Christoph Fuchs,et al. OLSRv2 for Community Networks: Using Directional Airtime Metric with external radios , 2015, Comput. Networks.
[16] Manpreet Singh,et al. Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[17] David L. Johnson,et al. Simple pragmatic approach to mesh routing using BATMAN , 2008 .
[18] George C. Polyzos,et al. Wireless community networks: an alternative approach for nomadic broadband network access , 2011, IEEE Communications Magazine.
[19] Leandro Navarro-Moldes,et al. A technological overview of the guifi.net community network , 2015, Comput. Networks.
[20] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[21] Geoffrey M. Voelker,et al. Usage Patterns in an Urban WiFi Network , 2010, IEEE/ACM Transactions on Networking.
[22] Leandro Navarro-Moldes,et al. WiBed, a platform for commodity wireless testbeds , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[23] Leandro Navarro-Moldes,et al. A case for research with and on community networks , 2013, CCRV.
[24] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[25] Lili Qiu,et al. Impact of Interference on Multi-Hop Wireless Network Performance , 2003, MobiCom '03.
[26] Eleonora Borgia,et al. Experimental evaluation of ad hoc routing protocols , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[27] Stefan Savage,et al. Detecting and Isolating Malicious Routers , 2006, IEEE Transactions on Dependable and Secure Computing.
[28] Zygmunt J. Haas,et al. Securing the Internet routing infrastructure , 2002, IEEE Commun. Mag..
[29] Sung-Ju Lee,et al. Realizing high performance multi-radio 802.11n wireless networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[30] Fatos Xhafa,et al. Mobility Effects on the Performance of Mobile Ad hoc Networks , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.
[31] Leonard Barolli,et al. Experimental Results of a MANET Testbed in Indoor Stairs Environment , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.
[32] Edward W. Knightly,et al. Assessment of urban-scale wireless networks with a small number of measurements , 2008, MobiCom '08.
[33] Nadeem Javaid,et al. Evaluating impact of mobility on wireless routing protocols , 2011, 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA).
[34] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[35] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[36] Richard G. Ogier,et al. Mobile Ad Hoc Network (MANET) Extension of OSPF Using Connected Dominating Set (CDS) Flooding , 2009, RFC.
[37] Qian Feng,et al. A Performance Comparison of the Ad Hoc Network Protocols , 2009, 2009 Second International Workshop on Computer Science and Engineering.
[38] Stefan Savage,et al. Detecting Malicious Packet Losses , 2009, IEEE Transactions on Parallel and Distributed Systems.
[39] Leandro Navarro-Moldes,et al. Receiver-driven routing for community mesh networks , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[40] Leïla Azouz Saïdane,et al. Experimental performance analysis of routing metrics in Wireless Mesh Networks , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[41] Mike Hibler,et al. An integrated experimental environment for distributed systems and networks , 2002, OSDI '02.
[42] Denis Ovsienko. Babel Hashed Message Authentication Code (HMAC) Cryptographic Authentication , 2014, RFC.
[43] Yiwei Cao,et al. Mobile Community Information Systems on Wireless Mesh Networks - An Opportunity for Developing Countries and Rural Areas , 2007 .
[44] Axel Neumann,et al. Evaluation of Dynamic Routing Protocols on Realistic Wireless Topologies , 2012 .
[45] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[46] Tuomas Aura,et al. Cryptographically Generated Addresses (CGA) , 2005, ISC.
[47] Nauman Mazhar,et al. MANET routing protocols vs mobility models: A performance evaluation , 2011, 2011 Third International Conference on Ubiquitous and Future Networks (ICUFN).
[48] Rudra Dutta,et al. A Survey of Network Design Problems and Joint Design Approaches in Wireless Mesh Networks , 2011, IEEE Communications Surveys & Tutorials.
[49] Terry Koziniec,et al. An experimental comparison of routing protocols in multi hop ad hoc networks , 2010, 2010 Australasian Telecommunication Networks and Applications Conference.
[50] Guy Juanole,et al. Evaluating Routing Protocols for the Wireless Mesh Backbone , 2007, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007).
[51] Florin Rusu,et al. Statistical analysis of sketch estimators , 2007, SIGMOD '07.
[52] Maria Bina,et al. Wireless Community Networks: A Case of Modern Collective Action , 2007 .
[53] Jitendra Padhye,et al. Routing in multi-radio, multi-hop wireless mesh networks , 2004, MobiCom '04.
[54] Leandro Navarro-Moldes,et al. KDet: Coordinated Detection of Forwarding Faults in Wireless Community Networks , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[55] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[56] Murali S. Kodialam,et al. Characterizing the capacity region in multi-radio multi-channel wireless mesh networks , 2005, MobiCom '05.
[57] Sajal K. Das,et al. Security Issues in Wireless Mesh Networks , 2008 .
[58] Bharat K. Bhargava,et al. On security study of two distance vector routing protocols for mobile ad hoc networks , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[59] M. K. Soni,et al. A Comparative Study for Secure Routing in MANET , 2010 .
[60] Robert Tappan Morris,et al. a high-throughput path metric for multi-hop wireless routing , 2005, Wirel. Networks.
[61] Leandro Navarro-Moldes,et al. An evaluation of BMX6 for community wireless networks , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[62] Giovanni Camponovo,et al. WLAN communities and Internet access sharing: a regulatory overview , 2005, International Conference on Mobile Business (ICMB'05).
[63] Manel Guerrero Zapata. Key management and delayed verification for Ad hoc networks , 2006, J. High Speed Networks.
[64] Piotr Szczechowiak,et al. Architecture of a Self Configuration Framework for 802.11-based multi-radio Mesh Networks , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[65] Abhay Roy,et al. Multi-Topology (MT) Routing in OSPF , 2007, RFC.
[66] K. Iqbal,et al. Performance evaluation of multiple routing protocols using multiple mobility models for mobile ad hoc networks , 2008, 2008 IEEE International Multitopic Conference.
[67] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[68] Wade Trappe,et al. A Comparative Study of AODV and OLSR on the ORBIT Testbed , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[69] Xin Zhang,et al. Secure and Scalable Fault Localization under Dynamic Traffic Patterns , 2012, 2012 IEEE Symposium on Security and Privacy.
[70] Ralf Steinmetz,et al. A security framework for wireless mesh networks , 2011, Wirel. Commun. Mob. Comput..
[71] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[72] Leandro Navarro-Moldes,et al. Advances in wireless community networks with the community-lab testbed , 2016, IEEE Communications Magazine.
[73] Juliusz Chroboczek,et al. The Babel Routing Protocol , 2021, RFC.
[74] A. Zakaria,et al. Performance evaluation of routing protocols in wireless mesh network , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).
[75] Ahmed Helmy,et al. IMPORTANT: a framework to systematically analyze the Impact of Mobility on Performance of Routing Protocols for Adhoc Networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[76] Nathan S. Evans. Methods for secure decentralized routing in open networks , 2011 .
[77] Miquel Oliver,et al. Wireless Commons against the digital divide , 2010, 2010 IEEE International Symposium on Technology and Society.
[78] German Castignani,et al. An evaluation of IEEE 802.11 community networks deployments , 2011, The International Conference on Information Networking 2011 (ICOIN2011).
[79] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[80] Leandro Navarro-Moldes,et al. Community-lab: Architecture of a community networking testbed for the future internet , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[81] Leandro Navarro-Moldes,et al. Evaluation of mesh routing protocols for wireless community networks , 2015, Comput. Networks.
[82] Jen-Wen Ding,et al. A cross-layer design for heterogeneous routing in wireless mesh networks , 2008, Int. J. Pervasive Comput. Commun..
[83] Leslie Lamport,et al. Proving the Correctness of Multiprocess Programs , 1977, IEEE Transactions on Software Engineering.
[84] Dilsun Kirli Kaynar,et al. On Adversary Models and Compositional Security , 2011, IEEE Security & Privacy.
[85] Panagiotis Papadimitratos,et al. The secure routing protocol (SRP) for ad hoc networks, IETF Internet Draft , 2002 .
[86] F. Z. Mughal,et al. Comparative analysis of proactive, reactive and hybrid ad hoc routing protocols in Client based Wireless Mesh Network , 2010, 2010 International Conference on Information and Emerging Technologies.
[87] Rafael Timóteo de Sousa Júnior,et al. Trust-based security for the OLSR routing protocol , 2013, Comput. Commun..
[88] L. Javier García-Villalba,et al. Self-Configuration and Self-Optimization Process in Heterogeneous Wireless Networks , 2011, Sensors.
[89] Yi Yang,et al. Generic Threats to Routing Protocols , 2006, RFC.
[90] Pascale Minet,et al. Scalability of the OLSR Protocol with the Fish Eye Extension , 2007, Sixth International Conference on Networking (ICN'07).
[91] Elizabeth M. Belding-Royer,et al. AODV routing protocol implementation design , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[92] Hari Balakrishnan,et al. A measurement study of vehicular internet access using in situ Wi-Fi networks , 2006, MobiCom '06.
[93] Ioannis G. Askoxylakis,et al. Business opportunities and considerations on wireless mesh networks , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.
[94] Renato Lo Cigno,et al. A week in the life of three large Wireless Community Networks , 2015, Ad Hoc Networks.
[95] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[96] David de Andrés,et al. Towards benchmarking routing protocols in wireless mesh networks , 2011, Ad Hoc Networks.
[97] Li Xiao,et al. Channel allocation in multi-channel wireless mesh networks , 2011, Comput. Commun..
[98] Matthias Hollick,et al. Routing performance of Wireless Mesh Networks: A practical evaluation of BATMAN advanced , 2011, 2011 IEEE 36th Conference on Local Computer Networks.
[99] Jiannong Cao,et al. Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Testbed , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.
[100] Jyotsna Sengupta,et al. AODV and OLSR routing protocols for Wireless Ad-hoc and Mesh Networks , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).
[101] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[102] Thomas H. Clausen,et al. Optimized Link State Routing Protocol Version 2 (OLSRv2) and MANET Neighborhood Discovery Protocol (NHDP) Extension TLVs , 2014, RFC.
[103] Leandro Navarro-Moldes,et al. Securely-entrusted multi-topology routing for community networks , 2016, 2016 12th Annual Conference on Wireless On-demand Network Systems and Services (WONS).
[104] Matthias Wachs,et al. A secure and resilient communication infrastructure for decentralized networking applications , 2015 .
[105] Philippe Jacquet,et al. Fish eye OLSR scaling properties , 2004, Journal of Communications and Networks.
[106] P. Kuppusamy,et al. A study and comparison of OLSR, AODV and TORA routing protocols in ad hoc networks , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[107] Vincenzo Mancuso,et al. A Measurement Study of Multiplicative Overhead Effects in Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[108] Llorenç Cerdà-Alabern,et al. Experimental Evaluation of BMX6 Routing Metrics in a 802.11an Wireless-Community Mesh Network , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.
[109] M. Abolhasan,et al. Real-world performance of current proactive multi-hop mesh protocols , 2009, 2009 15th Asia-Pacific Conference on Communications.
[110] Vishal Misra,et al. Distributed Channel Assignment in Multi-Radio 802.11 Mesh Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[111] Thomas Clausen,et al. Digital Signatures for Admittance Control in the Optimized Link State Routing Protocol Version 2 , 2010 .
[112] Wee Lum Tan,et al. Evaluating the performance impact of protocol parameters on ad-hoc network routing protocols , 2012, Australasian Telecommunication Networks and Applications Conference (ATNAC) 2012.
[113] Jochen H. Schiller,et al. Trends, Advances, and Challenges in Testbed-based Wireless Mesh Network Research , 2010, Mob. Networks Appl..
[114] Robert M. Hinden,et al. Unique Local IPv6 Unicast Addresses , 2005, RFC.
[115] Leandro Navarro-Moldes,et al. Community-Lab: Overview and invitation to the research community , 2012, 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P).
[116] Leandro Navarro-Moldes,et al. Guifi.net, a Crowdsourced Network Infrastructure Held in Common , 2015, Comput. Networks.
[117] Edward W. Knightly,et al. Measurement driven deployment of a two-tier urban mesh access network , 2006, MobiSys '06.
[118] Leandro Navarro-Moldes,et al. Community home gateways for P2P clouds , 2013, IEEE P2P 2013 Proceedings.
[119] Philippe Jacquet,et al. Comparative Study of Routing Protocols for Mobile Ad-hoc NETworks , 2002 .
[120] Xi Fang,et al. Channel allocation in non-cooperative multi-radio multi-channel wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[121] Llorenç Cerdà Alabern. Analysis of guifi.net's topology: extension of results , 2012 .
[122] Biswanath Mukherjee,et al. Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[123] David Johnson,et al. Comparison of two routing metrics in OLSR on a grid based mesh network , 2009, Ad Hoc Networks.
[124] Tom Goff,et al. Comparison studies of OSPF-MDR, OLSR and Composite Routing , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[125] Anatolij Zubow,et al. Adjacent channel interference in IEEE 802.11n , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[126] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[127] Arun Venkataramani,et al. Consensus Routing: The Internet as a Distributed System. (Best Paper) , 2008, NSDI.
[128] Hari Balakrishnan,et al. Measurement and analysis of real-world 802.11 mesh networks , 2010, IMC '10.
[129] Leonardo Maccari. An analysis of the Ninux wireless community network , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[130] Klaus Moessner,et al. Survey of Experimental Evaluation Studies for Wireless Mesh Network Deployments in Urban Areas Towards Ubiquitous Internet , 2013, IEEE Communications Surveys & Tutorials.
[131] Roger Pueyo Centelles,et al. Enhancing reflection and self-determination in a real-life community mesh network , 2015, Comput. Networks.
[132] Leonard Barolli,et al. Effects of Source and Destination Movement on MANET Performance Considering OLSR and AODV Protocols , 2010, 2010 13th International Conference on Network-Based Information Systems.
[133] Luiz A. DaSilva,et al. Routing, security, resource management, and monitoring in ad hoc networks: Implementation and integration , 2011, Comput. Networks.
[134] Panagiotis Papadimitratos,et al. How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET , 2006, 2006 3rd International Conference on Broadband Communications, Networks and Systems.
[135] Llorenç Cerdà-Alabern,et al. Experimental evaluation of a wireless community mesh network , 2013, MSWiM.
[136] Llorenç Cerdà-Alabern,et al. On the topology characterization of Guifi.net , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[137] Kameswari Chebrolu,et al. Long-distance 802.11b links: performance measurements and experience , 2006, MobiCom '06.
[138] Geoffrey M. Voelker,et al. Analysis of a mixed-use urban wifi network: when metropolitan becomes neapolitan , 2008, IMC '08.
[139] Leandro Navarro-Moldes,et al. Topology patterns of a community network: Guifi.net , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[140] George M. Giaglis,et al. Unwired Collective Action: Motivations of Wireless Community Participants , 2006, 2006 International Conference on Mobile Business.
[141] F. Garzia. Handbook of Communications Security , 2013 .
[142] Robert Tappan Morris,et al. Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM '04.