Jamming-based adversarial control of network flow allocation: A passivity approach
暂无分享,去创建一个
Basel Alomair | Radha Poovendran | Linda Bushnell | Andrew Clark | Phillip Lee | L. Bushnell | Andrew Clark | R. Poovendran | B. Alomair | Phillip Lee
[1] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[2] Valery A. Ugrinovskii,et al. One-shot control over an AVC-like adversarial channel , 2012, 2012 American Control Conference (ACC).
[3] Thomas Voice,et al. Stability of end-to-end algorithms for joint routing and rate control , 2005, CCRV.
[4] Sang Hyuk Son,et al. Real-Time Data Services for Cyber Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[5] Guevara Noubir,et al. Linear programming models for jamming attacks on network traffic flows , 2008, WiOpt 2008.
[6] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[7] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[8] Gabor Karsai,et al. Toward a Science of Cyber–Physical System Integration , 2012, Proceedings of the IEEE.
[9] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[10] John T. Wen,et al. A unifying passivity framework for network flow control , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] Radha Poovendran,et al. A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems , 2013, IEEE Transactions on Automatic Control.
[12] Sisi Liu,et al. Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.
[13] S Bhattacharya,et al. Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.
[14] Xin Liu,et al. Performance of IEEE 802.11 under Jamming , 2013, Mob. Networks Appl..
[15] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[16] Adrian Perrig,et al. The Coremelt Attack , 2009, ESORICS.