[1]
SU Hang, ZHANG Xi, Modeling throughput gain of network coding in multi-channel multi-radio wireless ad hoc networks [J]. Selected Areas in Communications, IEEE Journal on 2009, 27 (5) : 593-605.
DOI: 10.1109/jsac.2009.090603
Google Scholar
[2]
Cui Li ; Ju Hailing , Miao Yong, Li Tianpu , Wireless sensor network research progress [J] Computer Research and Development , 2005 ( 1 ) : 163 -174 .
Google Scholar
[3]
Kyasanur P and Vaidya N H. Selfish MAC Layer Misbehavior in Wireless Networks [J] IEEE Transactions on Mobile Computing (1536-1233), 2005, 4 (5):. 502-516.
DOI: 10.1109/tmc.2005.71
Google Scholar
[4]
Gunasekaran R, Uthariaraj VR, Yamini U, et al. A Distributed Mechanism for Handing of Adaptive / Intelligent Selfish Misbehavior at MAC Layer in Mobile Ad Hoc Networks [J]. Journal of Computer Science and Technology (1000-9000) ( print), 2009, 24 (3) : 472-481.
DOI: 10.1007/s11390-009-9238-z
Google Scholar
[5]
Raya M, Aad I, Hubaux J, Fawal A. DOMINO:. Detecting MAC Layer Greedy Behavior in IEEE 802. 11 Hotspots [J] IEEE Transactions on Mobile Computing, 2006. 5 (12): 1-11.
DOI: 10.1109/tmc.2006.183
Google Scholar
[6]
Liu Chun-feng, Shu Yan-tai, Yang Oliver, et al . Detection of Selfish Behavior in Wireless Ad Hoc Networks Based on CUSUM Algorithm [J]. Transactions of Tianjin University (1006-4982) (print), 2010, 16 (2): 104-108.
DOI: 10.1007/s12209-010-0018-1
Google Scholar
[7]
LAN / MAN Standards Committee of the IEEE Computer Society. Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks [K] USA: IEEE, (2003).
DOI: 10.1109/ieeestd.2003.94389
Google Scholar
[8]
Chen B, Mao J, Guo N, etal. An Incentive Detection Mechanism for Cooperation of Nodes Selfish Behavior in Wireless Sensor Networks, The 25th Chinese Control and Decision Conference, 2013: 4021-4024.
DOI: 10.1109/ccdc.2013.6561653
Google Scholar
[9]
Zhu data mining [M] Hefei: China Science and Technology University Press, 2002: 138 -139.
Google Scholar
[10]
Aiguo Li, sunny library of data mining theory, algorithms and applications [M], Xi'an: Xi'an University of Electronic Science and Technology Press, 2012: 124 -125.
Google Scholar
[11]
Bo Chen. IEEE 802. 15. 4 wireless sensor network nodes selfish behavior of [D]. Kunming University of Technology, 2013.
Google Scholar
[12]
RADOSAVAC S, BARAS JS, KOUTSOPOULOS IA framework for MAC protocol misbehavior detection in wireless networks [C] / / in Proceedings of the 4th ACM Workshop on wireless Security Cologne, Germany:. ACM press, 2005: 33-42.
DOI: 10.1145/1080793.1080801
Google Scholar
[13]
Jiao Yongjie, simulation of wireless sensor networks selfish node detection [J]. Computer Simulation, 2010 (11): 140- 143.
Google Scholar