Computer Science ›› 2013, Vol. 40 ›› Issue (12): 90-93.
Previous Articles Next Articles
YE Jin,LI Tao-shen,WANG Zheng-fei and ZHANG Xiang-li
[1] Gupta V,Krishnamurthy S,Faloutsos M.Denial of service attacks at MAC layer in wireless ad hoc networks[C]∥ Procee-dings of 2002MILCOM Conference.Anaheim,CA,2002:1118-1123 [2] Giri V R,Jaggi N.MAC layer misbehavior effectiveness and collective aggressive reaction approach[C]∥Proceedings of the 33th IEEE Sarnoff Symposium.Princeton,NJ,2010:1-5 [3] Raya M,Aad I,Hubaux J P.DOMINO:Detecting MAC layergreedy behavior in IEEE 802.11Hotspots[J].IEEE Transactions on Mobile Computing,2006,5(12):1-11 [4] Radosavac S,Baras J S,Koutsopoulos I.A framework for MAC protocol misbehavior detection in wireless networks[C]∥Proceedings of the 4th ACM Workshop on Wireless Security.Cologne,Germany,2005:33-42 [5] Kyasanur P,Vaidya N H.Selfish MAC layer Misbehavior inwireless networks[J].IEEE Transactions on Mobile Computing,2005,4(5):502-516 [6] Konorski J.Multiple access in ad hoc wireless LANs with noncooperative stations[C]∥Proceedings of NETWORKING.London,UK:Springer-Verlag,2002:1141-1146 [7] Lee S K,Rong Yan-xia,Choi H A.Detecting Stations Cheating on Backoff Rules in 802.11Networks Using Sequential Analysis[C]∥Proceedings of 25th IEEE International Conference on Computer Communications.Barcelona,Spain,2006:1-13 [8] Madwifi:a linux kernel device driver for wireless LAN chipsets[EB/OL].http://madwifi.org/,2011 |
No related articles found! |
|