메뉴 건너뛰기




Volumn , Issue , 2008, Pages 132-143

Detecting selfish behavior in a cooperative commons

Author keywords

[No Author keywords available]

Indexed keywords

ADMINISTRATIVE DOMAINS; COMMUNICATION CAPACITIES; GENERAL CLASSES; INFRA STRUCTURES; PACKET COLLISIONS;

EID: 57849129449     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DYSPAN.2008.22     Document Type: Conference Paper
Times cited : (10)

References (31)
  • 2
    • 57849161406 scopus 로고    scopus 로고
    • Sharing Spectrum through Spectrum Policy Reform and Cognitive Radio
    • to appear in
    • J. M. Peha. Sharing Spectrum through Spectrum Policy Reform and Cognitive Radio. to appear in Proc. of the IEEE.
    • Proc. of the IEEE
    • Peha, J.M.1
  • 4
    • 57849141165 scopus 로고    scopus 로고
    • Meraki Wireless Networks, meraki.com
    • Meraki Wireless Networks, meraki.com/.
  • 5
    • 57849164960 scopus 로고    scopus 로고
    • NetEquality Equal Access Community Internet
    • NetEquality Equal Access Community Internet, www.netequality.org/.
  • 7
    • 17744372294 scopus 로고    scopus 로고
    • Mesh Networks: Commodity Multihop Ad Hoc Networks
    • Mar
    • R. Bruno, M. Conti, E. Gregori. Mesh Networks: Commodity Multihop Ad Hoc Networks. IEEE Communication Magazine, 43:(3), pp.123-31, Mar. 2005.
    • (2005) IEEE Communication Magazine , vol.43 , Issue.3 , pp. 123-131
    • Bruno, R.1    Conti, M.2    Gregori, E.3
  • 8
    • 33749076431 scopus 로고    scopus 로고
    • Ad-hoc Cognitive Radio-Development to Frequency Sharing System by Using Multi-hop Network-
    • Nov
    • T. Fujii, Y. Suzuki. Ad-hoc Cognitive Radio-Development to Frequency Sharing System by Using Multi-hop Network-. Proc. IEEE DySPAN 2005, pp.589-92, Nov. 2005.
    • (2005) Proc. IEEE DySPAN 2005 , pp. 589-592
    • Fujii, T.1    Suzuki, Y.2
  • 9
    • 50249155159 scopus 로고    scopus 로고
    • Cooperative Communications for Cognitive Radio Networks
    • Jun
    • K. Hamdi, K. B. Letaief. Cooperative Communications for Cognitive Radio Networks. PGNet 2007, Jun. 2007.
    • (2007) PGNet 2007
    • Hamdi, K.1    Letaief, K.B.2
  • 12
    • 3042647758 scopus 로고    scopus 로고
    • Y. C. Hu, A. Perrig. A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy, special issue on Making Wireless Work, 2(3):28-29, May 2004.
    • Y. C. Hu, A. Perrig. A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy, special issue on Making Wireless Work, 2(3):28-29, May 2004.
  • 13
    • 0001341422 scopus 로고    scopus 로고
    • DSR:The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
    • Ch.5, pp, Addison-Wesley
    • D. B. Johnson, D. A. Maltz, J. Broch. DSR:The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. Ad Hoc Networking, Ch.5, pp.139-72, Addison-Wesley, 2001.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2    Broch, J.3
  • 15
    • 85031307530 scopus 로고    scopus 로고
    • C. E. Perkins, P. Bhagwat. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. Proc. of ACM SIGCOMM: Computer Communications Review, 24:(4), pp.234-44, Oct. 1994.
    • C. E. Perkins, P. Bhagwat. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. Proc. of ACM SIGCOMM: Computer Communications Review, 24:(4), pp.234-44, Oct. 1994.
  • 16
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
    • S. Marti, T. J. Guili, K. Lai, M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. Proc. of MOBICOM 2000, pp.255-65, 2000.
    • (2000) Proc. of MOBICOM , pp. 255-265
    • Marti, S.1    Guili, T.J.2    Lai, K.3    Baker, M.4
  • 19
    • 23944503145 scopus 로고    scopus 로고
    • rd ACM International Symposium on Mobile Ad Hoc Networking and Computing
    • Jun
    • rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, Jun. 2002.
    • (2002)
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 21
    • 27544444562 scopus 로고    scopus 로고
    • th IEEE Symposium on Computers and Communications
    • th IEEE Symposium on Computers and Communications, pp.37-42, 2005.
    • (2005) , pp. 37-42
    • Rebahi, Y.1    Mujica, V.2    Sisalem, D.3
  • 22
    • 4544283175 scopus 로고    scopus 로고
    • SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks
    • Mar
    • Q. He, D. Wu, P. Khosla. SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks. Proc. of IEEE WCNC2004, Mar. 2004.
    • (2004) Proc. of IEEE , vol.WCNC2004
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 23
    • 4544308674 scopus 로고    scopus 로고
    • Observation-based Cooperation Enforcement in Ad-hoc Networks
    • Technical Report, Stanford University
    • S. Bansal, M. Baker. Observation-based Cooperation Enforcement in Ad-hoc Networks. Technical Report, Stanford University, 2003.
    • (2003)
    • Bansal, S.1    Baker, M.2
  • 25
    • 33846579604 scopus 로고    scopus 로고
    • Why Does It Pay to Be Selfish in a MANET?
    • Dec
    • Y. Yoo, D. P. Agrawal. Why Does It Pay to Be Selfish in a MANET? IEEE Wireless Communications, 13:(6), pp.87-97, Dec. 2006.
    • (2006) IEEE Wireless Communications , vol.13 , Issue.6 , pp. 87-97
    • Yoo, Y.1    Agrawal, D.P.2
  • 26
    • 24944539915 scopus 로고    scopus 로고
    • K. Balakrishnan, J. Deng, P. K. Varshney. TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks. Proc. of IEEE Wireless Communications and Networking Conference, V.4, pp.2137-42, 2005.
    • K. Balakrishnan, J. Deng, P. K. Varshney. TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks. Proc. of IEEE Wireless Communications and Networking Conference, V.4, pp.2137-42, 2005.
  • 27
    • 33947624156 scopus 로고    scopus 로고
    • An Acknowledgement-Based Aproach for the Detection of Routing Misbehavior in MANETs
    • May
    • K. Liu, J. Deng, K. Balakrishnan. An Acknowledgement-Based Aproach for the Detection of Routing Misbehavior in MANETs. IEEE Transaction on Mobile Computing, 6:(5), May 2007.
    • (2007) IEEE Transaction on Mobile Computing , vol.6 , Issue.5
    • Liu, K.1    Deng, J.2    Balakrishnan, K.3
  • 28
    • 33847037106 scopus 로고    scopus 로고
    • New Approach for Selfish Nodes Detection in Mobile Ad hoc Networks
    • Sep
    • D. Djenouri, N. Badache. New Approach for Selfish Nodes Detection in Mobile Ad hoc Networks. Proc. of SECURECOMM'05, pp.288-94, Sep. 2005.
    • (2005) Proc. of SECURECOMM'05 , pp. 288-294
    • Djenouri, D.1    Badache, N.2
  • 29
    • 4544304744 scopus 로고    scopus 로고
    • The Sybil Attack
    • Mar
    • J. R. Douceur. The Sybil Attack. IPTPS '02, Mar. 2002.
    • (2002) IPTPS '02
    • Douceur, J.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.