메뉴 건너뛰기




Volumn 4, Issue 5, 2005, Pages 502-516

Selfish MAC Layer Misbehavior in Wireless Networks

Author keywords

network monitoring; network level security and protection; public networks; Wireless communication

Indexed keywords


EID: 85008044268     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2005.71     Document Type: Article
Times cited : (199)

References (32)
  • 4
    • 0242696192 scopus 로고    scopus 로고
    • Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes—Fairness In Dynamic Ad-Hoc NeTworks
    • June
    • S. Buchegger and J. Le Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes—Fairness In Dynamic Ad-Hoc NeTworks,” Proc. IEEE/ACM Symp. Mobile Ad Hoc Networking and Computing, June 2002.
    • (2002) Proc. IEEE/ACM Symp. Mobile Ad Hoc Networking and Computing
    • Buchegger, S.1    Le Boudec, J.2
  • 6
    • 3042520226 scopus 로고    scopus 로고
    • Report on a Working Session on Security in Wireless Ad Hoc Networks
    • L. Buttyan and J. H, eds. Nov.
    • “Report on a Working Session on Security in Wireless Ad Hoc Networks,” Mobile Computing and Comm. Rev., L. Buttyan and J. H, eds., vol. 6, no. 4, Nov. 2002.
    • (2002) Mobile Computing and Comm. Rev , vol.6 , Issue.4
  • 15
  • 16
    • 0003294665 scopus 로고    scopus 로고
    • third ed. chapter 3 Addison-Wesley
    • D.E. Knuth, The Art of Computer Programming, third ed., vol. 2, chapter 3, pp. 10–17. Addison-Wesley, 2000.
    • (2000) The Art of Computer Programming , vol.2 , pp. 10-17
    • Knuth, D.E.1
  • 18
    • 1542328495 scopus 로고    scopus 로고
    • Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations
    • J. Konorski, “Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations,” Proc. Networking Conf, 2002.
    • (2002) Proc. Networking Conf
    • Konorski, J.1
  • 19
    • 85008029715 scopus 로고    scopus 로고
    • Selfish Misbehavior at Medium Access Control Layer in Wireless Networks
    • master's thesis, Univ. of Illinois at Urbana-Champaign Dec.
    • P. Kyasanur, “Selfish Misbehavior at Medium Access Control Layer in Wireless Networks,” master's thesis, Univ. of Illinois at Urbana-Champaign, Dec. 2003.
    • (2003)
    • Kyasanur, P.1
  • 21
    • 0035508757 scopus 로고    scopus 로고
    • Game Theory and the Design of Self-Configuring, Adaptive Wireless Networks
    • A.B. MacKenzie and S.B. Wicker, “Game Theory and the Design of Self-Configuring, Adaptive Wireless Networks,” IEEE Comm. Magazine, vol. 39, no. 11, pp. 126–131, 2000.
    • (2000) IEEE Comm. Magazine , vol.39 , Issue.11 , pp. 126-131
    • MacKenzie, A.B.1    Wicker, S.B.2
  • 22
    • 0042474409 scopus 로고    scopus 로고
    • Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information
    • A.B. MacKenzie and S.B. Wicker, “Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information,” Proc. Infocom, 2003.
    • (2003) Proc. Infocom
    • MacKenzie, A.B.1    Wicker, S.B.2
  • 30
    • 0001831930 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks
    • Apr.
    • F. Stajano and R. Anderson, “The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks,” Proc. Security Protocols, Seventh Int'l Workshop, 172–194, Apr. 1999.
    • (1999) Proc. Security Protocols, Seventh Int'l Workshop , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 31
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion Detection in Wireless Ad-Hoc Networks
    • Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Networks,” Proc. Mobile Computing and Networking, pp. 275–283, 2000.
    • (2000) Proc. Mobile Computing and Networking , pp. 275-283
    • Zhang, Y.1    Lee, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.