Geomorphic zonalisation of wireless sensor networks based on prevalent jamming effects
暂无分享,去创建一个
[1] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[2] Ramesh Govindan,et al. Localized edge detection in sensor fields , 2003, Ad Hoc Networks.
[3] Mohammad S. Obaidat,et al. Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks , 2011, Comput. Commun..
[4] Ranjit Singh,et al. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.
[5] Muralidhar Medidi,et al. Robust Edge Detection in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[6] Sudip Misra,et al. A probabilistic approach to minimize the conjunctive costs of node replacement and performance loss in the management of wireless sensor networks , 2010, IEEE Transactions on Network and Service Management.
[7] David P. Kormann,et al. 802.11b access point mapping , 2003, CACM.
[8] P. Venkata Krishna,et al. A simple learning automata-based solution for intrusion detection in wireless sensor networks , 2011, Wirel. Commun. Mob. Comput..
[9] Urbashi Mitra,et al. Boundary Estimation in Sensor Networks: Theory and Methods , 2003, IPSN.
[10] Murat Çakiroglu,et al. Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.
[11] Lisa Ann Osadciw,et al. Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.
[12] Wenyuan Xu,et al. On Adjusting Power to Defend Wireless Networks from Jamming , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[13] Mark de Berg,et al. Computational geometry: algorithms and applications , 1997 .
[14] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[15] George Dimitoglou,et al. Using Standard Deviation in Signal Strength Detection to Determine Jamming in Wireless Networks , 2008, CAINE.
[16] Gruia-Catalin Roman,et al. Consistent group membership in ad hoc networks , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[17] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[18] P. Venkata Krishna,et al. An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks , 2010, Comput. Math. Appl..
[19] Wei Hong,et al. Beyond Average: Toward Sophisticated Sensing with Queries , 2003, IPSN.
[20] Sudip Misra,et al. Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks , 2010, Comput. Electr. Eng..
[21] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[22] Leonidas J. Guibas,et al. Collaborative signal and information processing: an information-directed approach , 2003 .
[23] Robert Morris,et al. Location Proxies and Intermediate Node Forwarding for Practical Geographic Forwarding , 2001 .
[24] Srdjan Capkun,et al. Detection of Reactive Jamming in Sensor Networks , 2009 .