Author:
Lei Tao,Wang Shangguang,Li Jinlin,You Ilsun,Yang Fangchun
Funder
National Nature Science Foundation of China
Natural Science Foundation of Beijing Municipality
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference18 articles.
1. Sun B, Osborne L, Xiao Y, Guizani S (2007) Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wirel Commun 14:56–63
2. Yokoyama S, Nakane Y, Takahashi O, Miyamoto E (2006) Evaluation of the impact of selfish nodes in ad hoc networks and detection and countermeasure methods. In: 7th international conference on mobile data management, (MDM 2006), pp 95–100
3. Padiya S, Pandit R, Patel S (2013) Survey of Innovated Techniques to detect selfish nodes in MANET. In: International journal of computer networking, wireless and mobile communications (IJCNWMC), pp 2250–1568
4. Rodriguez-Mayol A, Gozalvez J (2013) Reputation based selfishness prevention techniques for mobile ad-hoc networks. Springer Telecommunication Systems, pp 1–15
5. Buttyán L, Hubaux J-P (2003) Stimulating cooperation in self-organizing mobile ad hoc networks. Mob Netw Appl 8:579–592
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献