[1] TOH C K, DONGKYUN K, SUTAEK O H. The controversy of selfish nodes in Ad Hoc networks[C]// Proceedings of the 2010 12th International Conference on Advanced Communication Technology. Piscataway: IEEE, 2010: 1087-1092. [2] IVAN D B, RENIER V H, MARTIN S O. Analysing the fairness of trust-based mobile Ad Hoc network protocols[C]// Proceedings of the 2011 Information Security for South Africa. Piscataway: IEEE, 2011: 1-8. [3] ABDERRAHIM B, ABDERREZAK R, DEEPAK D. Relative fairness and optimized throughput for mobile Ad Hoc networks[C]// Proceedings of the 2008 IEEE International Conference on Communications. Piscataway: IEEE, 2008: 2233-2237. [4] EASTLAKE D 3rd, ABLEY J. IANA considerations and IETF protocol and documentation usage for IEEE 802 parameters: RFC7042[EB/OL]. [2013-10-01]. http:// www. rfc-editor.org/rfc/rfc7042.txt. [5] EASTLAKE D 3rd. IANA considerations and IETF protocol usage for IEEE 802 parameters: RFC5342[EB/OL].[2008-09-01]. http://www.rfc-editor.org/rfc/rfc5342.txt. [6] WANG C, LI B, LI L M. A new collision resolution mechanism to enhance the performance of IEEE 802.11 DCF[J]. Vehicular Technology, 2004, 53(4): 1235-1246. [7] MACKENZIE A, WICKER S. Stability of multipacket slotted Aloha with selfish users and perfect information[C]// Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications. Piscataway: IEEE, 2003: 1583-1590. [8] KYASANUR P, VAIDYA N. Detection and handling of MAC layer misbehavior in wireless networks[C]// Proceedings of the 2003 International Conference Dependable Systems and Networks. Piscataway: IEEE, 2003: 173-182. [9] KYASANUR P, VAIDYA N. Selfish MAC layer misbehavior in wireless networks[J]. IEEE Transactions on Mobile Computing, 2005, 4(5): 502-516. [10] LIU C, SHU Y, LI M, et al. A new mechanism to detect selfish behavior in IEEE 802.11 Ad Hoc networks[C]// Proceedings of the 2009 IEEE International Conference on Communications. Piscataway: IEEE, 2009: 1-5. [11] LIU C. Study on selfish behavior in MAC layer of IEEE802.11 wireless Ad Hoc networks [D]. Tianjin: Tianjin University, 2008. (刘春凤. IEEE802.11无线Ad Hoc网络MAC层自私行为研究[D]. 天津:天津大学, 2008.) [12] SERRANO P, BANCHS A, TARGON V, et al. Detecting selfish configurations in 802.11 WLANs[J]. IEEE Communications Letters, 2010, 24(2): 142-144. [13] SERRANO P, BANCHS A, PATRAS P, et al. Optimal configuration of 802.11e EDCA for real-time and data traffic [J]. IEEE Transactions on Vehicular Technology, 2010, 59(5): 2511-2528. [14] GIRI V R, JAGGI N. MAC layer misbehavior effectiveness and collective aggressive reaction approach[C]// Proceedings of the 33rd IEEE Sarnoff Symposium. Piscataway: IEEE, 2010: 1-5. [15] LI M, SERGIO S, LI P, et al. MAC-Layer selfish misbehavior in IEEE802.11 Ad Hoc networks: detection and defense[J]. IEEE Transactions on Mobile Computing, 2015, 14(6): 1203-1217. [16] BANCHS A, ORTIN J, DOUGLAS J L, et al. Thwarting selfish behavior in 802.11 WLANs[J]. IEEE/ACM Transactions on Networking, 2014, 34(1): 1-14. [17] LEE J W, TANG A, HUANG J W, et al. Reverse-engineering MAC: a non-cooperative game model[J]. IEEE Journal on Selected Areas in Communications, 2007, 6(25): 1135-1147. [18] LEE J W, TANG A, HUANG J W, et al. Utility-optimal random-access control[J]. IEEE Communications Society, 2007, 7(6): 2741-2751. [19] RAD A H M, HUANG J W, CHIANG M, et al. Utility-optimal random access without message passing [J].Wireless Communications, 2009, 3(8): 1073-1079. [20] BONONI L, CONTI M. Runtime optimization of IEEE 802.11 wireless LANs performance[J]. Parallel and Distributed Systems, 2004, 15(1): 66-80. [21] HEUSSE M, ROUSSEAU F, GUILLIER R, et al. Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless LANs [J]. ACM SIGCOMM, 2005,23(2): 121-132. [22] BIANCHI G. Performance analysis of the IEEE 802.11 distributed coordination function [J]. Selected Areas in Communications, 2002, 18(3): 535-547. [23] KUMAR P R, MEYN S P. Stability of queueing networks and scheduling policies[J]. IEEE Transactions on Automatic Control, 1995, 40(2): 251-260. [24] GEORGIADIS L, MICHAEL J, TASSIULAS R. Resource allocation and cross-layer control in wireless networks [J]. Foundations and Trends in Networking, 2006, 35(1): 1-149. [25] KRISHNA H, WANG Y. Fast algorithms for wide sense stability of ARMA filters[C]// Proceedings of the 1988 International Acoustics, Speech, and Signal Processing. Piscataway: IEEE, 1988: 11-14. [26] CHUNG J, CLAYPOOL M. Ns by example[M/OL].[2015-06-10]. http://nile.wpi.edu/NS/. [27] JAIN R, CHIU D, HAWE W. A quantitative measure of fairness and discrimination for resource allocation in shared computer systems, Technical Report TR-301[R]. Palo Alto: DEC Research, 1984. |