Analysis of Effect of User Misbehaviours on the Reservation-Based MAC Protocols in Wireless Communication Networks
暂无分享,去创建一个
Jun-ichi Takada | Lunchakorn Wuttisittikulkij | Norrarat Wattanamongkhol | Warakorn Srichavengsup | Robithoh Annur | Pisit Vanichchanunt | J. Takada | L. Wuttisittikulkij | P. Vanichchanunt | R. Annur | W. Srichavengsup | N. Wattanamongkhol
[1] Jin Soo Park,et al. Throughput analysis of split-channel MAC with p-persistent CSMA on the control channel and reservation scheme , 2008, 2008 International Conference on Telecommunications.
[2] Christos H. Papadimitriou,et al. Selfish caching in distributed systems: a game-theoretic analysis , 2004, PODC '04.
[3] Patrick P. C. Lee,et al. On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009, Comput. Networks.
[4] Albert Banchs,et al. Detecting selfish configurations in 802.11 WLANs , 2010, IEEE Communications Letters.
[5] Patrick P. C. Lee,et al. On the Detection of Signaling DoS Attacks on 3G Wireless Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[6] Jerzy Konorski,et al. A Game-Theoretic Study of CSMA/CA Under a Backoff Attack , 2006, IEEE/ACM Transactions on Networking.
[7] George Kesidis,et al. Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs , 2007, IEEE Journal on Selected Areas in Communications.
[8] Stefano Tomasin,et al. Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ , 2010, IEEE Transactions on Wireless Communications.
[9] H. Inaltekin,et al. The Analysis of Nash Equilibria of the One-Shot Random-Access Game for Wireless Networks and the Behavior of Selfish Nodes , 2008, IEEE/ACM Transactions on Networking.
[10] Paolo Santi,et al. The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes , 2008, IEEE Transactions on Mobile Computing.
[11] S. Tasaka,et al. Integrated video and data transmission in the TDD ALOHA-reservation wireless LAN , 1995, Proceedings IEEE International Conference on Communications ICC '95.
[12] L. Wuttisittikulkij,et al. Channel reservation techniques under misbehaved users in high bit-rate wireless communication systems , 2004, 2004 IEEE Region 10 Conference TENCON 2004..
[13] Saurabh Ganeriwal,et al. On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[14] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[15] Maxim Raya,et al. DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.
[16] D. Raychaudhuri,et al. ATM-based transport architecture for multiservices wireless personal communication networks , 1994, IEEE J. Sel. Areas Commun..
[17] Victor C. M. Leung,et al. Dynamic reservation TDMA protocol for wireless ATM networks , 2001, IEEE J. Sel. Areas Commun..
[18] John S. Baras,et al. Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers , 2007, J. Comput. Secur..
[19] Bhaskar Ramamurthi,et al. Packet reservation multiple access for local wireless communications , 1989, IEEE Trans. Commun..
[20] Zhuo Lu,et al. On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[21] Chadi Assi,et al. Enhancing IEEE 802.11 Random Backoff in Selfish Environments , 2008, IEEE Transactions on Vehicular Technology.
[22] Dimitri P. Bertsekas,et al. Data Networks , 1986 .
[23] Oliver W. W. Yang,et al. A New Mechanism to Detect Selfish Behavior in IEEE 802.11 Ad Hoc Networks , 2009, 2009 IEEE International Conference on Communications.
[24] Giuseppe Di Battista,et al. 26 Computer Networks , 2004 .
[25] Raj Jain,et al. A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems , 1998, ArXiv.
[26] Leonard Kleinrock,et al. On queueing problems in random-access communications , 1985, IEEE Trans. Inf. Theory.
[27] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[28] Yunghsiang Sam Han,et al. Analyzing split channel medium access control schemes , 2006, IEEE Transactions on Wireless Communications.
[29] Victor C. M. Leung,et al. Analytical Modeling of Contention-Based Bandwidth Request Mechanism in IEEE 802.16 Wireless Networks , 2008, IEEE Transactions on Vehicular Technology.
[30] Xiang-Yang Li,et al. Low-cost routing in selfish and rational wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.
[31] Victor O. K. Li,et al. A multiple access scheme for multimedia traffic in wireless ATM , 1996, Mob. Networks Appl..
[32] Lunchakorn Wuttisittikulkij,et al. A Design and Performance Evaluation of a Class of Channel Reservation Techniques for Medium Access Control Protocols in High Bit-Rate Wireless Communications , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[33] Larry J. Greenstein,et al. Resource auction multiple access (RAMA) in the cellular environment , 1994, Proceedings of IEEE Vehicular Technology Conference (VTC).
[34] Jianhua He,et al. Modeling Contention Based Bandwidth Request Scheme for IEEE 802.16 Networks , 2007, IEEE Communications Letters.
[35] Xiaodong Wang,et al. Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks , 2008, IEEE Transactions on Information Forensics and Security.