[1]LAN/MAN Standards Committee of the IEEE Computer Society. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks [S]. Piscataway: IEEE Press, 2003.[2]王殊,阎毓杰,胡富平,等.无线传感器网络的理论及应用[M].北京:北京航空航天大学出版社,2007.[3]陈林星.无线传感器网络技术与应用[M].北京:电子工业出版社,2009.[4]LI H P, MAO J L, GUO N, et al. Study on throughput of network with selfish nodes based on IEEE 802.15.4 [C]// Advanced Research on Computer Education, Simulation and Modeling. Berlin: Springer, 2011: 411-417.[5]CAGALJ M, GANERIWAL S, AAD I, et al. On selfish behavior in CSMA/CA networks [C]// INFOCOM 2005: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Washington, DC: IEEE Computer Society, 2005: 2513-2524.[6]GUNASEKARAN R, UTHARIARAJ V R, YAMINI U, et al. A distributed mechanism for handing of adaptive/intelligent selfish misbehavior at MAC layer in mobile Ad Hoc networks [J]. Journal of Computer Science and Technology, 2009, 24(3): 472-481.[7]KYASANUR P, VAIDYA N. Detection and handling of MAC layer misbehavior in wireless networks [C]// Proceedings of the 2003 International Conference on Dependable Systems and Networks. Washington, DC: IEEE Computer Society, 2003: 173-182.[8]RADOSAVAC S, BARAS J S, KOUTSOPOULOS I. A framework for MAC protocol misbehavior detection in wireless networks [C]// Proceedings of the 4th ACM Workshop on Wireless Security. New York: ACM Press, 2005: 33-42.[9]刘春凤.IEEE 802.11无线Ad Hoc网络MAC层自私行为研究[D].天津:天津大学,2008.[10]杨武成.Ad Hoc网络MAC层自私行为检测机制研究[D].天津:天津大学,2009.[11]柯志亨,程荣祥.NS仿真实验——多媒体和无线网络通信[M].北京:电子工业出版社,2009.[12]黄化吉,冯穗力,秦丽姣,等.NS网络模拟和协议仿真[M].北京:人民邮电出版社,2010. |