메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages

Detecting MAC layer back-off timer violations in mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE AD HOC NETWORKS; NODES; STATISTICAL INFERENCE;

EID: 33947631920     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2006.28     Document Type: Conference Paper
Times cited : (19)

References (26)
  • 1
    • 33947634236 scopus 로고    scopus 로고
    • Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE STD 802.11.
    • Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE STD 802.11.
  • 2
    • 0033749075 scopus 로고    scopus 로고
    • Performance Analysis of the IEEE 802.11 Distributed Coordination Function
    • G. Bianchi. Performance Analysis of the IEEE 802.11 Distributed Coordination Function. IEEE Journal on Selected Areas in Communications, 18(3), 2000.
    • (2000) IEEE Journal on Selected Areas in Communications , vol.18 , Issue.3
    • Bianchi, G.1
  • 3
    • 0041438376 scopus 로고    scopus 로고
    • Kalman Filter Estimation of the Number of Competing Terminals in an IEEE 802.11 network
    • G. Bianchi and I. Tinnirello. Kalman Filter Estimation of the Number of Competing Terminals in an IEEE 802.11 network. In Proceedings of IEEE INFOCOM, 2003.
    • (2003) Proceedings of IEEE INFOCOM
    • Bianchi, G.1    Tinnirello, I.2
  • 5
    • 33947629921 scopus 로고    scopus 로고
    • K. Fall and K. Varadhan. ns notes and documentation. Technical report, UC Berkeley, LBL, USC/ISI, Xerox PARC, 2002.
    • K. Fall and K. Varadhan. ns notes and documentation. Technical report, UC Berkeley, LBL, USC/ISI, Xerox PARC, 2002.
  • 8
    • 33751413873 scopus 로고    scopus 로고
    • Packet Leashes: A Defence against Wormhole Attacks in Wireless Networks
    • Y. Hu, A. Perrig, and D. Johnson. Packet Leashes: A Defence against Wormhole Attacks in Wireless Networks. In Proceedings of IEEE INFOCOM, 2002.
    • (2002) Proceedings of IEEE INFOCOM
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 9
    • 33947667114 scopus 로고    scopus 로고
    • L. Kleinrock. Queueing Systems: I: Theory. John Wiley and Sons, 1975.
    • L. Kleinrock. Queueing Systems: Volume I: Theory. John Wiley and Sons, 1975.
  • 10
    • 0242696170 scopus 로고    scopus 로고
    • ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks
    • J. Kong and X. Hong. ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In Proceedings of ACM MOBIHOC, 2003.
    • (2003) Proceedings of ACM MOBIHOC
    • Kong, J.1    Hong, X.2
  • 11
    • 1542268558 scopus 로고    scopus 로고
    • Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting
    • J. Konorski. Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting. PROMS, 2213, 2001.
    • (2001) PROMS , vol.2213
    • Konorski, J.1
  • 12
    • 84948142128 scopus 로고    scopus 로고
    • Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations
    • J. Konorski. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations. NETWORKING, 2345, 2002.
    • (2002) NETWORKING , vol.2345
    • Konorski, J.1
  • 16
    • 1542358393 scopus 로고    scopus 로고
    • Game theoretic analysis of security in mobile ad hoc networks
    • Technical report, Institut Eurecom
    • P. Michiardi and R. Molva. Game theoretic analysis of security in mobile ad hoc networks. Technical report, Institut Eurecom, 2002.
    • (2002)
    • Michiardi, P.1    Molva, R.2
  • 17
    • 4544324338 scopus 로고    scopus 로고
    • DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots
    • M. Raya, J. Hubaux, and I. Aad. DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. In Proceedings of MOBISYS, 2004.
    • (2004) Proceedings of MOBISYS
    • Raya, M.1    Hubaux, J.2    Aad, I.3
  • 22
    • 84943554835 scopus 로고    scopus 로고
    • The AD-MIX protocol for Encouraging Participation in Mobile Ad Hoc Networks
    • S. Sundaramurthy and E. Royer. The AD-MIX protocol for Encouraging Participation in Mobile Ad Hoc Networks. In Proceedings of IEEE ICNP, 2003.
    • (2003) Proceedings of IEEE ICNP
    • Sundaramurthy, S.1    Royer, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.