References

Biswas S and Morris R 2005 Exor: Opportunistic multi-hop routing for wireless networks SIGCOMM'05, Philadelphia, Pennsylvania.

Brik V, Banerjee S, Gruteser M and Oh S 2008 Wireless device identification with radiometric signatures Proceedings of the 14th ACM International Conference on Mobile Computing and Networking MobiCom '08, pp. 116–127.

Couto DD, Aguayo D, Bicket J and Morris R 2003 A high-throughput path metic for multi-hop wireless routing ACM MobiCom '03, San Diego, California.

Demirbas M and Song Y 2006 An rssi-based scheme for sybil attack detection in wireless sensor networks Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks WOWMOM, pp. 564–570.

Eschenauer L and Gligor VD 2002 A key-management scheme for distributed sensor networks CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM, New York, NY, USA.

Faria DB and Cheriton DR 2006 Detecting identity-based attacks in wireless networks using signalprints Proceedings of the 5th ACM Workshop on Wireless Security, WiSe, pp. 43–52.

Greenberger M 1961 Notes on a new pseudo-random number generator. Journal of the Association of Computing Machinery 8(2), 163–167.

Jamieson K and Balakrishnan H 2007 Ppr: Partial packet recovery for wireless networks ACM SIGCOMM, Kyoto, Japan.

Kim KH and Shin KG 2006 On accurate measurement of link quality in multi-hop wireless mesh networks MobiCom '06: Proceedings of the 12th Annual ...

Get Multihop Wireless Networks: Opportunistic Routing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.