Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC
暂无分享,去创建一个
[1] David Starobinski,et al. RTS/CTS-induced congestion in ad hoc wireless LANs , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[2] P. Gburzynski,et al. Hidden Problems with the Hidden Node Problem , 2006, 23rd Biennial Symposium on Communications, 2006.
[3] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[4] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[5] Chadi Assi,et al. Enhancing IEEE 802.11 Random Backoff in Selfish Environments , 2008, IEEE Transactions on Vehicular Technology.
[6] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[7] Sarvar Patel,et al. An Efficient MAC for Short Messages , 2002, Selected Areas in Cryptography.
[8] Abderrahim Benslimane,et al. A Secure Architecture for Mobile Ad Hoc Networks , 2006, MSN.
[9] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[10] Mario Gerla,et al. Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks , 2003, Ad Hoc Networks.
[11] Vaduvur Bharghavan,et al. MACAW: a media access protocol for wireless LAN's , 1994, SIGCOMM 1994.
[12] P. Karn,et al. MACA-a New Channel Access Method for Packet Radio , 1990 .
[13] Chadi Assi,et al. A Confident Community to Secure Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[14] Martin Nilsson,et al. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).