-
1
-
-
13844296355
-
Wireless mesh networks: A survey
-
DOI 10.1016/j.comnet.2004.12.001, PII S1389128604003457
-
I. F. Akyildiz, X. Wang, and W. Wang, "Wireless Mesh Networks: A Sur vey," Comp. Net., vol. 47, no. 4, 2005, pp. 445-87. (Pubitemid 40242422)
-
(2005)
Computer Networks
, vol.47
, Issue.4
, pp. 445-487
-
-
Akyildiz, I.F.1
Wang, X.2
Wang, W.3
-
2
-
-
79953793814
-
-
IEEE Std. P802.11s/D1.01
-
IEEE Std. P802.11s/D1.01, 2007; https://mentor.ieee.org/802.11/dcn/07/11- 07-0335-00-000s-tgs-redline-between-draft-d1-00-and-d1-01.pdf.
-
(2007)
-
-
-
3
-
-
77955388626
-
Selective jamming attacks in wireless networks
-
A. Proano and L. Lazos, "Selective Jamming Attacks in Wireless Networks," Proc. IEEE ICC, 2010.
-
(2010)
Proc. IEEE ICC
-
-
Proano, A.1
Lazos, L.2
-
5
-
-
4444307562
-
Multi-Channel MAC for Ad Hoc Networks: Handling multi-channel hidden terminals using a single transceiver
-
J. So and N. H. Vaidya, "Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals using a Single Transceiver," Proc. ACM MobiHoc, 2004, pp. 222-33.
-
(2004)
Proc. ACM MobiHoc
, pp. 222-33
-
-
So, J.1
Vaidya, N.H.2
-
6
-
-
44349085254
-
Probabilistic mitigation of control channel jamming via random key distribution
-
P. Tague, M. Li, and R. Poovendran, "Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution," Proc. PIMRC, 2007, pp. 1-5.
-
(2007)
Proc. PIMRC
, pp. 1-5
-
-
Tague, P.1
Li, M.2
Poovendran, R.3
-
7
-
-
70349111445
-
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
-
L. Lazos, S. Liu, and M. Krunz, "Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks," Proc. 2nd ACM WiSec, 2009, pp. 169-80.
-
(2009)
Proc. 2nd ACM WiSec
, pp. 169-80
-
-
Lazos, L.1
Liu, S.2
Krunz, M.3
-
8
-
-
37749010823
-
Cross-Layer Jamming detection and mitigation in wireless broadcast networks
-
J. Chiang and Y.-C. Hu, "Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks," Proc. ACM MobiCom, 2007, pp. 346-49.
-
(2007)
Proc. ACM MobiCom
, pp. 346-49
-
-
Chiang, J.1
Hu, Y.-C.2
-
10
-
-
33947624156
-
An acknowledgment-based approach for the detection of routing misbehavior in MANETs
-
K. Liu et al., "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Trans. Mobile Comp., vol. 6, no. 5, 2007, pp. 536-50.
-
(2007)
IEEE Trans. Mobile Comp.
, vol.6
, Issue.5
, pp. 536-50
-
-
Liu, K.1
-
11
-
-
84885887137
-
Dealing with liars: Misbehavior identification via rényi-ulam games
-
Springer
-
W. Kozma and L. Lazos, "Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games," in Security and Privacy in Communication Networks, Springer, 2009, pp. 207-27.
-
(2009)
Security and Privacy in Communication Networks
, pp. 207-27
-
-
Kozma, W.1
Lazos, L.2
-
12
-
-
77956948315
-
A Survey of trust and reputation management systems in wireless communications
-
H. Yu et al., "A Survey of Trust and Reputation Management Systems in Wireless Communications," Proc. IEEE, vol. 98, no. 10, 2010, pp. 1755-72.
-
(2010)
Proc. IEEE
, vol.98
, Issue.10
, pp. 1755-72
-
-
Yu, H.1
-
13
-
-
34547532527
-
A secure incentive protocol for mobile ad hoc networks
-
DOI 10.1007/s11276-006-6220-3
-
Y. Zhang et al., "A Secure Incentive Protocol for Mobile Ad Hoc Networks," Wireless Net., vol. 13, no. 5, 2007, pp. 569-82. (Pubitemid 47185248)
-
(2007)
Wireless Networks
, vol.13
, Issue.5
, pp. 569-582
-
-
Zhang, Y.1
Lou, W.2
Liu, W.3
Fang, Y.4
-
14
-
-
50149105732
-
Impact of denial of service attacks on ad hoc networks
-
I. Aad, J.-P. Hubaux, and E. W. Knightly, "Impact of Denial of Service Attacks on Ad Hoc Networks," IEEE/ACM Trans. Net., vol. 16, no. 4, 2008, pp. 791-802.
-
(2008)
IEEE/ACM Trans. Net.
, vol.16
, Issue.4
, pp. 791-802
-
-
Aad, I.1
Hubaux, J.-P.2
Knightly, E.W.3
-
15
-
-
0035394785
-
ATCP: TCP for mobile ad hoc networks
-
J. Liu and S. Singh, "ATCP: TCP for Mobile Ad Hoc Networks," IEEE JSAC, vol. 19, no. 7, 2002, pp. 1300-15.
-
(2002)
IEEE JSAC
, vol.19
, Issue.7
, pp. 1300-15
-
-
Liu, J.1
Singh, S.2
|