Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC
暂无分享,去创建一个
[1] John S. Baras,et al. Cross-layer attacks in wireless ad hoc networks 1 , 2004 .
[2] Sarvar Patel,et al. An Efficient MAC for Short Messages , 2002, Selected Areas in Cryptography.
[3] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[4] Abderrahim Benslimane,et al. Cross-Layer Approach to Improve the Monitoring Process for Mobile Ad Hoc Networks Based on IEEE 802.11 , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[5] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[6] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[7] Chadi Assi,et al. A Confident Community to Secure Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[8] David Starobinski,et al. RTS/CTS-induced congestion in ad hoc wireless LANs , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[9] P. Gburzynski,et al. Hidden Problems with the Hidden Node Problem , 2006, 23rd Biennial Symposium on Communications, 2006.
[10] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[11] P. Karn,et al. MACA-a New Channel Access Method for Packet Radio , 1990 .
[12] Mario Gerla,et al. Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks , 2003, Ad Hoc Networks.
[13] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[14] Chadi Assi,et al. Enhancing IEEE 802.11 Random Backoff in Selfish Environments , 2008, IEEE Transactions on Vehicular Technology.
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[17] Vaduvur Bharghavan,et al. MACAW: a media access protocol for wireless LAN's , 1994, SIGCOMM 1994.
[18] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[19] Martin Nilsson,et al. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[20] Abderrahim Benslimane,et al. A Secure Architecture for Mobile Ad Hoc Networks , 2006, MSN.
[21] David Starobinski,et al. On False Blocking in RTS/CTS-Based Multihop Wireless Networks , 2007, IEEE Transactions on Vehicular Technology.
[22] Chadi Assi,et al. MAC layer misbehavior in wireless networks: challenges and solutions , 2008, IEEE Wireless Communications.