SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Raja Gunasekaran, Vaidheyanathan Rhymend Uthariaraj, Uamapathy Yamini, Rajagopalan Sudharsan, Selvaraj Sujitha Priyadarshini. A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks[J]. Journal of Computer Science and Technology, 2009, 24(3): 472-481. |
[1] |
Moscibroda T, Wattenhofer R. The complexity of connec-tivity in wireless networks. In Proc. IEEE INFOCOM,Barcelona, Spain, April 23-29, 2006, pp.1-3.
|
[2] |
Alberto Lopez Toledo, Xiaodong Wang. Robust detectionof selˉsh misbehavior in wireless networks. IEEE Journalon Selected Areas in Communications, August 2007, 25(6):1124-1134.
|
[3] |
Lopez Toledo A, Vercauteren T, Wang X. Adaptive optimiza-tion of IEEE 802.11 DCF based on Bayesian estimation ofthe number of competing terminals. IEEE Transaction onMobile Computing, Nov. 2006, 5(9): 1283-1296.
|
[4] |
Li M, Prabhakaran B. MAC Layer Admission Control andPriority Re-Allocation for Handling QoS Guarantees in Non-Cooperative Wireless LANs Mobile Networks and Applica-tions. Springer Science & Business Media, Inc., 2005, pp.947-959.
|
[5] |
Jin Y, Kesidis G. Distributed contention window control forselˉsh users in IEEE 802.11 wireless LANs. IEEE Journalon Selected Areas in Communications, August 2007, 25(6):1113-1123.
|
[6] |
Lopez Toledo A, Wang X. A robust Kolmogorov-Smirnov de-tector for misbehavior in IEEE 802.11 DCF. In Proc. IEEEInternational Conference on Communications (ICC'07),Glasgow, UK, June 24-28, 2007, pp.1564-1569.
|
[7] |
Chen L, Leneutre J. Selˉshness, not always a nightmare:Modeling selˉsh MAC behaviors in wireless mobile ad hocnetworks. In Proc. the 27th International Conference on Dis-tributed Computing Systems (ICDCS'07), Toronto, Canada,June 25-29, 2007, p.16.
|
[8] |
Jang-Won Lee, Ao Tang, Jianwei Huang, Mung Chiang,A Robert Calderbank. Reverse-engineering MAC: A non-cooperative game model. IEEE Journal on Selected Areasin Communications, August 2007, 25(6): 1135-1147.
|
[9] |
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V Krish-namurthy. Detecting MAC layer back-o? timer violationsin mobile ad hoc networks. In Proc. the 26th IEEE In-ternational Conference on Distributed Computing Systems(ICDCS 2006), Lisbon, Portugal, July 4-7, 2006, pp.63-73.
|
[10] |
Kyasanur P, Vaidya N. Selˉsh MAC layer misbehavior inwireless networks. IEEE Transactions on Mobile Computing,September 2005.
|
[11] |
Mackenzie B, Wicker S B. Game theory and the design ofself-conˉguring, adaptive wireless networks. IEEE Commu-nications Magazine, 2000, 39(11): 126-131.
|
[12] |
Raya M, Hubaux J P, Aad I. DOMINO: A system to de-tect greedy behavior in IEEE 802.11 hotspots. In Proc. MOBISYS'04, Boston, USA, June 6-9, 2004, pp.84-97.
|
[13] |
Cardenas A A, Radosavac S, Baras J S. Detection and preven-tion of MAC layer misbehavior for ad hoc networks. TechnicalReport, Univ. Maryland, 2004.
|
[14] |
Fall K, Varadhan K. Ns notes and documentation. UC Berke-ley, LBL, USC/ISI, Xerox PARC, 2003.
|
[15] |
Jin Y, Kesidis G. Charge sensitive and incentive compatibleend to end window-based control for selˉsh users. IEEE JSACSpecial Issue on Network Economics and Pricing, May 2006,24(5): 952-961.
|
[16] |
Konorski J. Multiple access in ad-hoc wireless LANs with non-cooperative stations. In Proc. NETWORKING, Coimbra,Portugal, LNCS 2345, Springer, May 15-19, 2002, pp.1141-1146.
|
[17] |
MacKenzie B, Wicker S B. Stability of multipacket slottedaloha with selˉsh users and perfect information. In Proc.Infocom 2003, San Francisco, CA, IEEE, March 30-April 3,2003, pp.1583-1597.
|
[1] | Bo Chen, Liang Liu, Hua-Dong Ma. CDM: Content Diffusion Model for Information-Centric Networks[J]. Journal of Computer Science and Technology, 2021, 36(6): 1431-1451. DOI: 10.1007/s11390-021-0205-7 |
[2] | Shou-Wan Gao, Peng-Peng Chen, Xu Yang, Qiang Niu. Multi-Sensor Estimation for Unreliable Wireless Networks with Contention-Based Protocols[J]. Journal of Computer Science and Technology, 2018, 33(5): 1072-1085. DOI: 10.1007/s11390-018-1862-z |
[3] | Yue-Feng Du, De-Rong Shen, Tie-Zheng Nie, Yue Kou, Ge Yu. Content-Related Repairing of Inconsistencies in Distributed Data[J]. Journal of Computer Science and Technology, 2016, 31(4): 741-758. DOI: 10.1007/s11390-016-1660-4 |
[4] | Jin-Tao Meng, Jian-Rui Yuan, Sheng-Zhong Feng, Lian-Sheng Tan. Power Adjusting Algorithm: A New Cross-Layer Power Saving Mechanism for Mobile Ad-Hoc Networks[J]. Journal of Computer Science and Technology, 2013, 28(1): 42-53. DOI: 10.1007/s11390-013-1311-y |
[5] | Jun Wang, Yong-Tao Cao, Jun-Yuan Xie, Shi-Fu Chen. Energy Efficient Backoff Hierarchical Clustering Algorithms for Multi-Hop Wireless Sensor Networks[J]. Journal of Computer Science and Technology, 2011, 26(2): 283-291. DOI: 10.1007/s11390-011-1131-x |
[6] | Wei-Sheng Si, Cheng-Zhi Li. RMAC: A Reliable MAC Protocol Supporting Multicastfor Wireless Ad Hoc Networks[J]. Journal of Computer Science and Technology, 2005, 20(5): 702-712. |
[7] | Yun Li, Ke-Ping Long, Wei-Liang Zhao, Feng-Rui Yang. RWBOA(Pd,w): Novel Backoff Algorithm for IEEE 802.11 DCF[J]. Journal of Computer Science and Technology, 2005, 20(2). |
[8] | WU HaiTao, LIN Yu, CHENG ShiDuan, PENG Yong, LONG KePing. IEEE 802.11 Distributed Coordination Function: Enhancement and Analysis[J]. Journal of Computer Science and Technology, 2003, 18(5). |
[9] | WU HaiTao, LIN Yu, CHENG ShiDuan. A Distributed Fair Scheduling Scheme in Wireless LAN[J]. Journal of Computer Science and Technology, 2003, 18(5). |
[10] | WU HaiTao, CHENG ShiDuan. DCF+: An Enhancement for Reliable Transport Protocol over WLAN[J]. Journal of Computer Science and Technology, 2003, 18(2). |