메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Detecting greedy behaviors by linear regression in wireless ad hoc networks

Author keywords

Ad hoc networks; Greedy behavior; IEEE 802.11 MAC protocol; Linear regression

Indexed keywords

ACCESS TIME; CHANNEL ACCESS; CSMA/CA; DETECTION MODELS; GREEDY BEHAVIOR; IEEE 802.11 MAC PROTOCOL; IEEE 802.11 MAC PROTOCOLS; IEEE 802.11 TECHNOLOGY; MISBEHAVING NODES; MODEL-BASED; WAITING-TIME;

EID: 70449476931     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2009.5198908     Document Type: Conference Paper
Times cited : (15)

References (18)
  • 2
    • 4544324338 scopus 로고    scopus 로고
    • DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots
    • Raya M, Hubaux J-P, and Aad I. 2004. DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. In Proc. of MOBISYS'04.
    • (2004) Proc. of MOBISYS'04
    • Raya, M.1    Hubaux, J.-P.2    Aad, I.3
  • 3
    • 1542360013 scopus 로고    scopus 로고
    • Detection and handling of MAC layer misbehavior in wireless networks
    • Kyasanur P, Vaidya N. Detection and handling of MAC layer misbehavior in wireless networks. 2003. In Dependable Systems and Networks.
    • (2003) Dependable Systems and Networks
    • Kyasanur, P.1    Vaidya, N.2
  • 4
    • 0037003792 scopus 로고    scopus 로고
    • Denial of service attacks at the mac layer in wireless ad hoc networks
    • Gupta V, Krishnamurthy S, and Faloutsos M. 2002. Denial of service attacks at the mac layer in wireless ad hoc networks. In Proc. IEEE MILCOM.
    • (2002) Proc. IEEE MILCOM
    • Gupta, V.1    Krishnamurthy, S.2    Faloutsos, M.3
  • 5
    • 48249157110 scopus 로고    scopus 로고
    • Detection and prevention of MAC layer misbehavior for ad hoc networks
    • Cárdenas A, Radosavac S, Baras J-S. 2004. Detection and prevention of MAC layer misbehavior for ad hoc networks. In Proc. of SASN.
    • (2004) Proc. of SASN
    • Cárdenas, A.1    Radosavac, S.2    Baras, J.-S.3
  • 8
    • 70449494578 scopus 로고    scopus 로고
    • Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. 1997. IEEE standards 802.11.
    • Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. 1997. IEEE standards 802.11.
  • 9
    • 1542268558 scopus 로고    scopus 로고
    • Konorski J. 2001. Protection of Fairness for Multimedia Traffic Streams in a Non-cooperativeWireless LAN Setting. In PROMS, 2213 of LNCS.
    • Konorski J. 2001. Protection of Fairness for Multimedia Traffic Streams in a Non-cooperativeWireless LAN Setting. In PROMS, volume 2213 of LNCS.
  • 10
    • 84948142128 scopus 로고    scopus 로고
    • Konorski J. 2002. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations. In NETWORKING, 2345 of LNCS.
    • Konorski J. 2002. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations. In NETWORKING, volume 2345 of LNCS.
  • 11
    • 0035508757 scopus 로고    scopus 로고
    • 200. Game Theory and the Design of Self-Configuring. Adaptive Wireless Networks
    • Mackenzie A, Wicker S. 200. Game Theory and the Design of Self-Configuring. Adaptive Wireless Networks. IEEE Communications Magazine, 39(11):126 131.
    • IEEE Communications Magazine , vol.39 , Issue.11 , pp. 126-131
    • Mackenzie, A.1    Wicker, S.2
  • 12
    • 0042474409 scopus 로고    scopus 로고
    • MacKenzie A, Wicker S. 2003. Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information. In Proc. of Infocom 2003, San Francisco, CA, IEEE.
    • MacKenzie A, Wicker S. 2003. Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information. In Proc. of Infocom 2003, San Francisco, CA, IEEE.
  • 13
    • 0036088611 scopus 로고    scopus 로고
    • D. Burroughs D, L. Wilson L, and G. Cybenko G. 2002. Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods. In Proc. of IEEE International Performance Computing and Communication Conference.
    • D. Burroughs D, L. Wilson L, and G. Cybenko G. 2002. Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods. In Proc. of IEEE International Performance Computing and Communication Conference.
  • 14
    • 84964425047 scopus 로고    scopus 로고
    • Goseva-Popstojanova K, Wang F, Wang R, Gong F, Vaidyanathan K, Trivedi K, and Muthusamy B. 2001. Characterizing Intrusion Tolerant Systems using a State Transition Model. In Proc. of DARPA Information Survivability Conference and Exposition II (DISCEX01).
    • Goseva-Popstojanova K, Wang F, Wang R, Gong F, Vaidyanathan K, Trivedi K, and Muthusamy B. 2001. Characterizing Intrusion Tolerant Systems using a State Transition Model. In Proc. of DARPA Information Survivability Conference and Exposition II (DISCEX01).
  • 15
    • 70449483805 scopus 로고    scopus 로고
    • Sanders W, Cukier M, Webber F, Pal P, and Watro R. 2002. Probabilistic Validation of Intrusion Tolerance. In Digest of Fast Abstracts: The International Conference on Dependable Systems and Networks, Bethesda, Maryland.
    • Sanders W, Cukier M, Webber F, Pal P, and Watro R. 2002. Probabilistic Validation of Intrusion Tolerance. In Digest of Fast Abstracts: The International Conference on Dependable Systems and Networks, Bethesda, Maryland.
  • 17
    • 0037885580 scopus 로고    scopus 로고
    • Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
    • Gran Canaria, pp
    • Buchegger S, Le Boudec J. 2002. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In Proc. of Tenth Euromicro PDP, Gran Canaria, pp. 403 410.
    • (2002) Proc. of Tenth Euromicro PDP , pp. 403-410
    • Buchegger, S.1    Le Boudec, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.