MeshJam: Intelligent Jamming Attack and Defense in IEEE 802.11s Wireless Mesh Networks
暂无分享,去创建一个
[1] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[2] Michalis Faloutsos,et al. Assessing link quality in IEEE 802.11 Wireless Networks: Which is the right metric? , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.
[3] Johannes Lessmann,et al. Rope ladder routing: Position-based multipath routing for wireless mesh networks , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[4] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[5] Guevara Noubir,et al. Quantifying the Impact of Efficient Cross-Layer Jamming Attacks via Network Traffic Flows , 2022 .
[6] Nitin H. Vaidya,et al. Proceedings of the sixteenth annual international conference on Mobile computing and networking , 2010, MobiCom 2010.
[7] Wenyuan Xu,et al. Short paper: Jamming-resilient multipath routing leveraging availability-based correlation , 2011, WiSec '11.
[8] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[9] Mihui Kim,et al. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System , 2010, Sensors.
[10] Ivan Martinovic,et al. Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.
[11] Philip Levis,et al. Achieving single channel, full duplex wireless communication , 2010, MobiCom.
[12] Satish K. Tripathi,et al. A framework for reliable routing in mobile ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[13] Rachelin Sujae. Packet Hiding Methods for Preventing Selective Jamming Attacks , 2013 .
[14] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[15] Marius Portmann,et al. Experimental evaluation of measurement-based SINR interference models , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[16] Ashish Kumar,et al. Packet-Hiding Methods for Preventing Selective Jamming Attacks , 2013 .