-
1
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," Wirel. Netw., vol. 11, no. 1-2, pp. 21-38, 2005.
-
(2005)
Wirel. Netw
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
2
-
-
27844524055
-
Design of an effective lossdistinguishable mac protocol for 802.11 wlan
-
Sep
-
Q. Pang, S. Liew, and V. Leung, "Design of an effective lossdistinguishable mac protocol for 802.11 wlan," Communications Letters, IEEE, vol. 9, no. 9, pp. 781-783, Sep 2005.
-
(2005)
Communications Letters, IEEE
, vol.9
, Issue.9
, pp. 781-783
-
-
Pang, Q.1
Liew, S.2
Leung, V.3
-
3
-
-
39049137564
-
Cara: Collision-aware rate adaptation for ieee 802.11 wlans
-
April
-
J. Kim, S. Kim, S. Choi, and D. Qiao, "Cara: Collision-aware rate adaptation for ieee 802.11 wlans," INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, pp. 1-11, April 2006.
-
(2006)
INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings
, pp. 1-11
-
-
Kim, J.1
Kim, S.2
Choi, S.3
Qiao, D.4
-
4
-
-
33947166189
-
Novel collision detection scheme and its applications for ieee 802.11 wireless lans
-
2007
-
J.-H. Yun and S.-W. Seo, "Novel collision detection scheme and its applications for ieee 802.11 wireless lans," Computer Communications, vol. 30, no. 6, pp. 1350-1366, -2007-.
-
Computer Communications
, vol.30
, Issue.6
, pp. 1350-1366
-
-
Yun, J.-H.1
Seo, S.-W.2
-
5
-
-
33947627591
-
Mac layer channel quality measurement in 802.11
-
Feb
-
D. Malone, P. Clifford, and D. J. Leith, "Mac layer channel quality measurement in 802.11," Communications Letters, IEEE, vol. 11, no. 2, pp. 143-145, Feb. 2007.
-
(2007)
Communications Letters, IEEE
, vol.11
, Issue.2
, pp. 143-145
-
-
Malone, D.1
Clifford, P.2
Leith, D.J.3
-
6
-
-
0142218930
-
-
M. Just, E. Kranakis, and T. Wan, Resisting malicious packet dropping in wireless ad hoc networks, in In Proc. of ADHOCNOW03. Springer Verlag, 2003, pp. 151-163.
-
M. Just, E. Kranakis, and T. Wan, "Resisting malicious packet dropping in wireless ad hoc networks," in In Proc. of ADHOCNOW03. Springer Verlag, 2003, pp. 151-163.
-
-
-
-
7
-
-
17144396001
-
Lipad: Lightweight packet drop detection for ad hoc networks
-
2, Sept
-
F. Anjum and R. Talpade, "Lipad: lightweight packet drop detection for ad hoc networks," Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th, vol. 2, pp. 1233-1237 Vol. 2, Sept. 2004.
-
(2004)
Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th
, vol.2
, pp. 1233-1237
-
-
Anjum, F.1
Talpade, R.2
-
8
-
-
38049004945
-
Detection of packet forwarding misbehavior in mobile ad-hoc networks
-
WWIC, F. Boavida, E. Monteiro, S. Mascolo, and Y. Koucheryavy, Eds, Springer, Online, Available
-
O. F. Gonzalez, M. P. Howarth, and G. Pavlou, "Detection of packet forwarding misbehavior in mobile ad-hoc networks." in WWIC, ser. Lecture Notes in Computer Science, F. Boavida, E. Monteiro, S. Mascolo, and Y. Koucheryavy, Eds., vol. 4517. Springer, 2007, pp. 302-314. [Online]. Available: http://dblp.uni-trier.de/db/conf/wwic/wwic2007.html#GonzalezHP07
-
(2007)
ser. Lecture Notes in Computer Science
, vol.4517
, pp. 302-314
-
-
Gonzalez, O.F.1
Howarth, M.P.2
Pavlou, G.3
-
9
-
-
36448934185
-
On loss differentiation for csma-based dense wireless network
-
November
-
H. Ma, J. Zhu, and S. Roy, "On loss differentiation for csma-based dense wireless network," Communications Letters, IEEE, vol. 11, no. 11, pp. 877-879, November 2007.
-
(2007)
Communications Letters, IEEE
, vol.11
, Issue.11
, pp. 877-879
-
-
Ma, H.1
Zhu, J.2
Roy, S.3
-
10
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
New York, NY, USA: ACM
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2000, pp. 255-265.
-
(2000)
MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
11
-
-
3142747076
-
Secure routing in ad hoc networks and a related intrusion detection problem
-
2, Oct
-
W. Zhang, R. Rao, G. Cao, and G. Kesidis, "Secure routing in ad hoc networks and a related intrusion detection problem," Military Communications Conference, 2003. MILCOM 2003. IEEE, vol. 2, pp. 735-740 Vol.2, Oct. 2003.
-
(2003)
Military Communications Conference, 2003. MILCOM 2003. IEEE
, vol.2
, pp. 735-740
-
-
Zhang, W.1
Rao, R.2
Cao, G.3
Kesidis, G.4
-
12
-
-
33845762444
-
Detecting ieee 802.11 mac layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
-
S. Radosavac, A. A. Cárdenas, J. S. Baras, and G. V. Moustakides, "Detecting ieee 802.11 mac layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers," J. Comput. Secur., vol. 15, no. 1, pp. 103-128, 2007.
-
(2007)
J. Comput. Secur
, vol.15
, Issue.1
, pp. 103-128
-
-
Radosavac, S.1
Cárdenas, A.A.2
Baras, J.S.3
Moustakides, G.V.4
-
13
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
New York, NY, USA: ACM
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in MobiHoc '05: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. New York, NY, USA: ACM, 2005, pp. 46-57.
-
(2005)
MobiHoc '05: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
14
-
-
0033749075
-
Performance analysis of the ieee 802.11 distributed coordination function
-
Mar
-
G. Bianchi, "Performance analysis of the ieee 802.11 distributed coordination function," Selected Areas in Communications, IEEE Journal on, vol. 18, no. 3, pp. 535-547, Mar 2000.
-
(2000)
Selected Areas in Communications, IEEE Journal on
, vol.18
, Issue.3
, pp. 535-547
-
-
Bianchi, G.1
-
15
-
-
0036350746
-
Performance of reliable transport protocol over ieee 802.11 wireless lan: Analysis and enhancement
-
2
-
H. Wu, Y. Peng, K. Long, S. Cheng, and J. Ma, "Performance of reliable transport protocol over ieee 802.11 wireless lan: analysis and enhancement," INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 2, pp. 599-607 vol.2, 2002.
-
(2002)
INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE
, vol.2
, pp. 599-607
-
-
Wu, H.1
Peng, Y.2
Long, K.3
Cheng, S.4
Ma, J.5
-
17
-
-
4544237141
-
Optimal packet size in error-prone channel for ieee 802.11 distributed coordination function
-
3, March
-
J. Yin, X. Wang, and D. Agrawal, "Optimal packet size in error-prone channel for ieee 802.11 distributed coordination function," Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE, vol. 3, pp. 1654-1659 Vol.3, March 2004.
-
(2004)
Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE
, vol.3
, pp. 1654-1659
-
-
Yin, J.1
Wang, X.2
Agrawal, D.3
-
18
-
-
24944468457
-
A performance analysis of the 802.11 wireless lan medium access control
-
N. Gupta and P. R. Kumar, "A performance analysis of the 802.11 wireless lan medium access control," Communications in Information and Systems, vol. 3, no. 4, pp. 279-304, 2004.
-
(2004)
Communications in Information and Systems
, vol.3
, Issue.4
, pp. 279-304
-
-
Gupta, N.1
Kumar, P.R.2
-
19
-
-
70449509066
-
802.11 markov channel modeling,
-
Ph.D. dissertation, School of Information Sciences, University of Pittsburgh
-
J. N. Arauz, "802.11 markov channel modeling," Ph.D. dissertation, School of Information Sciences, University of Pittsburgh, 2004.
-
(2004)
-
-
Arauz, J.N.1
-
20
-
-
34548046194
-
Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks
-
K.-F. Ssu, C.-H. Chou, and L.-W. Cheng, "Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks," Comput. Commun., vol. 30, no. 11-12, pp. 2342-2352, 2007.
-
(2007)
Comput. Commun
, vol.30
, Issue.11-12
, pp. 2342-2352
-
-
Ssu, K.-F.1
Chou, C.-H.2
Cheng, L.-W.3
|