Citation: | FU Xiao-mei, ZHAO Yan-ling. Selfish behavior detection of cooperative relay[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2013, 22(1): 55-59. |
[1] |
Tun Huo, Yi Beng, Li Jianhua. Security issues and solutions in wireless communications at physical layer[J]. China Communications, 2011, 8(5): 11-19.
|
[2] |
Balakrishnan K, Deng Jing, Varshney P K. TWOACK: preventing selfishness in mobile Ad Hoc networks[C]//Wireless Connunications and Networking Conference. McLean,VA,USA: IEEE, 2005:2137-2142.
|
[3] |
Refaei M T, DaSilva L A, Eltoweissy M, et al. Adaptation of reputation management systems to dynamic network conditions in ad hoc networks[J]. Computers, IEEE Transactions on, 2010, 59(5):707-719.
|
[4] |
Janzadeh H, Fayazbakhsh K, Dehghan M, et al. A secure credit-based cooperation stimulating mechanism for MANETs using hash Chains[J]. In Elservier FGCS, 2009, 25(8):926-934.
|
[5] |
Dehnie S, Memon N. Detection of misbehavior in cooperative diversity[C]//Proceedings of IEEE Military Communications Conference. San Diego, Calif, USA: IEEE, 2008:1-5.
|
[6] |
Zhu Han, Sun Y L. Securing cooperative transmission in wireless communications[C]//Proceedings of the Fourth Annual International Conference on Mobile and Ubiquitous Systems. Philadelphia, PA: IEEE, 2007:1-6.
|
[7] |
Xiang He, Yener A. Cooperation with an untrusted relay: a secrecy perspective [J]. IEEE Trans Inf Theory, 2010, 56(8):3807-3827.
|
[8] |
Dehnie S, Memon N. Cooperative diversity with selfish users[C]//42
ndAnnual Conference on Information Sciences and Systems. Princeton, NJ: IEEE, 2008:1184-1188.
|
[9] |
Dehnie S, Sencar H T, Memon N. Cooperative amplify and forward in the presence of a selfish partner[EB/OL].[2011-11-01]. http://isis.poly.edu/~seccoopcomm/pubs/globecom2007.
|