References
- Kannhavong B., Nakayama H., Nemoto Y., Kato N., and Jamalipour A., "A survey of routing attacks in mobile ad hoc networks," Wireless Communications, vol.14, no.5, pp. 85-91, 2007. https://doi.org/10.1109/MWC.2007.4396947
- D. Wang, M. Hu, and H. Zhi, "A survey of secure routing in ad hoc networks," in Proc. of 9th International Conference on Web-Age Information Management, pp.482-486, Jul.2008.
- K. Hong, S. Lee, K. Kim, and Y. Kim, "Channel condition based contention window adaptation in IEEE 802.11 WLANs," IEEE Transactions on Communications, vol.60, no.2, pp.469-478, 2012. https://doi.org/10.1109/TCOMM.2012.012012.100472
- M. Cagalj, S. Ganeriwal, I. Aad, and J. P. Hubaux, "On cheating in CSMA/CA ad hoc networks," EPFL Technical report, No. IC/2004/27, 2004. http://www.mendeley.com/research/on-cheating-in-csmaca-ad-hoc-networks/.
- Kyasanur P. and Vaidya N, "Detection and handling of MAC layer misbehavior in wireless networks," in Proc. of International Conference on Dependable Systems and Networks, pp.173-82, Jun.2003.
- J. Liu, P. Geng, Y. Qiu, and G. Feng, "A secure routing mechanism in AODV for Ad Hoc networks," in Proc. of International Symposium on Intelligent Signal Processing and Communication Systems, pp.435-438, Nov.2007.
- Andras Farago, "Scalable analysis and design of ad hoc networks via random graph theory," in Proc. of 6th international workshop on Discrete algorithms and methods for mobile computing and communications, pp.43-50, Sep.2002.
- Tsumoto S., and Hirano S., "Visualization of rule's similarity using multidimensional scaling," in Proc. of 3rd IEEE International Conference on Data Mining, pp.339-346, Nov.2003.
- Thomas L. Saaty, "Decision making with the analytic hierarchy process," International Journal of Services Sciences, vol.1, no.1, pp.83-98, 2008. https://doi.org/10.1504/IJSSCI.2008.017590
- Fei Shi, Jaejong Baek, Jooseok Song, and Weijie Liu, "A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks," Journal of Telecommunication Systems, 2011.
- Dilip Kumar, Trilok C. Aseri and R.B. Patel, "Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks," International Journal of Information Technology, Communications and Convergence, vol.1, no.2, pp.130-145, 2011. https://doi.org/10.1504/IJITCC.2011.039281
Cited by
- A Reliant Certificate Revocation of Malicious Nodes in MANETs vol.90, pp.2, 2012, https://doi.org/10.1007/s11277-015-3016-8