A Jamming-Resilient and Scalable Broadcasting Algorithm for Multiple Access Channel Networks
暂无分享,去创建一个
[1] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[2] Marco Gruteser,et al. An experimental study of inter-cell interference effects on system performance in unplanned wireless LAN deployments , 2008, Comput. Networks.
[3] Srihari Nelakuditi,et al. CSMA/CN: carrier sense multiple access with collision notification , 2012, TNET.
[4] R. A. Leibler,et al. On Information and Sufficiency , 1951 .
[5] Hongbo Zhu,et al. Congestion-Optimal WiFi Offloading with User Mobility Management in Smart Communications , 2018, Wirel. Commun. Mob. Comput..
[6] Alvin S. Lim,et al. Jamming and anti-jamming techniques in wireless networks: a survey , 2014, Int. J. Ad Hoc Ubiquitous Comput..
[7] Injong Rhee,et al. WiFox: scaling WiFi performance for large audience environments , 2012, CoNEXT '12.
[8] Lawrence G. Roberts,et al. ALOHA packet system with and without slots and capture , 1975, CCRV.
[9] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..
[10] Frank Thomson Leighton,et al. Analysis of Backoff Protocols for Multiple Access Channels , 1996, SIAM J. Comput..
[11] Mythili Vutukuru,et al. TCP Download Performance in Dense WiFi Scenarios: Analysis and Solution , 2017, IEEE Transactions on Mobile Computing.
[12] Yung-Fang Chen,et al. Jamming Resilient Cross-Layer Resource Allocation in Uplink HARQ-Based SIMO OFDMA Video Transmission Systems , 2017, IEEE Access.
[13] Ian F. Akyildiz,et al. A survey on wireless mesh networks , 2005, IEEE Communications Magazine.
[14] Bülent Tavli,et al. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009, Comput. Stand. Interfaces.
[15] Bogdan S. Chlebus,et al. Broadcasting in ad hoc multiple access channels , 2015, Theor. Comput. Sci..
[16] Xin Liu,et al. Performance of IEEE 802.11 under Jamming , 2013, Mob. Networks Appl..
[17] Alec Wolman,et al. Designing High Performance Enterprise Wi-Fi Networks , 2008, NSDI.
[18] Srinivasan Seshan,et al. Understanding and mitigating the impact of RF interference on 802.11 networks , 2007, SIGCOMM '07.
[19] Zheng Dou,et al. An Adaptive Resource Allocation Model With Anti-Jamming in IoT Network , 2019, IEEE Access.
[20] Allan Borodin,et al. Adversarial queuing theory , 2001, JACM.
[21] Norman M. Abramson,et al. THE ALOHA SYSTEM: another alternative for computer communications , 1899, AFIPS '70 (Fall).
[22] Michael A. Bender,et al. Adversarial contention resolution for simple channels , 2005, SPAA '05.
[23] David J. Aldous. Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels , 1987, IEEE Trans. Inf. Theory.
[24] J. Hayes,et al. An Adaptive Technique for Local Distribution , 1978, IEEE Trans. Commun..
[25] Frank Kelly,et al. Stochastic Models of Computer Communication Systems , 1985 .
[26] John Capetanakis,et al. Tree algorithms for packet broadcast channels , 1979, IEEE Trans. Inf. Theory.
[27] Victor B. Lawrence,et al. A Novel Low-Complexity Low-Latency Power Efficient Collision Detection Algorithm for Wireless Sensor Networks , 2015 .
[28] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[29] Eli Upfal,et al. Stochastic Contention Resolution With Short Delays , 1998, SIAM J. Comput..
[30] Baruch Awerbuch,et al. Universal-stability results and performance bounds for greedy contention-resolution protocols , 2001, JACM.
[31] Zhu Han,et al. Jamming Mitigation via Hierarchical Security Game for IoT Communications , 2018, IEEE Access.
[32] Jianhua Lin,et al. Divergence measures based on the Shannon entropy , 1991, IEEE Trans. Inf. Theory.
[33] Dariusz R. Kowalski,et al. Maximum throughput of multiple access channels in adversarial environments , 2017, Distributed Computing.
[34] Biplab Sikdar,et al. A Wireless MAC Protocol with Collision Detection , 2007, IEEE Transactions on Mobile Computing.
[35] Sebastian Rampfl. Network Simulation and its Limitations , 2013 .
[36] Peng Ning,et al. Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks , 2012, IEEE Transactions on Signal Processing.
[37] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[38] Kevin C. Almeroth,et al. Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks , 2010, IEEE Transactions on Mobile Computing.