Jamming in underwater sensor networks: detection and mitigation
暂无分享,去创建一个
Athanasios V. Vasilakos | Mohammad S. Obaidat | Sudip Misra | Manas Khatua | Suraj Dash | A. Vasilakos | M. Obaidat | S. Misra | M. Khatua | Suraj Dash
[1] Jiejun Kong,et al. Time-critical underwater sensor diffusion with no proactive exchanges and negligible reactive floods , 2007, Ad Hoc Networks.
[2] Wang Chunlei,et al. Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes , 2009 .
[3] George Dimitoglou,et al. Using Standard Deviation in Signal Strength Detection to Determine Jamming in Wireless Networks , 2008, CAINE.
[4] Chun Tung Chou,et al. Detecting Wormhole Attacks in Wireless Sensor Networks , 2006 .
[5] Jiejun Kong,et al. Building underwater ad-hoc networks and sensor networks for large scale real-time aquatic applications , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[6] Lisa Ann Osadciw,et al. Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.
[7] Hewijin Christine Jiau,et al. Localization with mobile anchor points in wireless sensor networks , 2005, IEEE Transactions on Vehicular Technology.
[8] Yi Zhou,et al. A Localization Scheme for Underwater Wireless Sensor Networks , 2009 .
[9] Yixian Yang,et al. A ranging based scheme for detecting the wormhole attack in wireless sensor networks , 2012 .
[10] Michael Joswig,et al. Beneath-and-Beyond Revisited , 2002, Algebra, Geometry, and Software Systems.
[11] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[12] Mohamed Hamdi,et al. Doppler Effect on Location-Based Tracking in Mobile Sensor Networks , 2007, 2007 IEEE/ACS International Conference on Computer Systems and Applications.
[13] Taieb Znati,et al. Locate More Nodes in Under Water Sensor Networks Using Out-of-Range Information , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[14] Milica Stojanovic,et al. Shallow-Water Acoustic Networks† , 2003 .
[15] Zhou Shengli,et al. Prospects and problems of wireless communication for underwater sensor networks , 2008 .
[16] Dario Pompili,et al. Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.
[17] Mario Gerla,et al. Localization with Dive'N'Rise (DNR) beacons for underwater acoustic sensor networks , 2007, Underwater Networks.
[18] Dario Pompili,et al. Deployment analysis in underwater acoustic wireless sensor networks , 2006, Underwater Networks.
[19] Jun-Hong Cui,et al. Aqua-Net : An Underwater Sensor Network Architecture — Design and Implementation , 2009 .
[20] Srdjan Capkun,et al. Detection of Reactive Jamming in Sensor Networks , 2009 .
[21] Sudip Misra,et al. Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks , 2010, Comput. Electr. Eng..
[22] Ellis Horowitz,et al. Fundamentals of Computer Algorithms , 1978 .
[23] Jun-Hong Cui,et al. Scalable Localization with Mobility Prediction for Underwater Sensor Networks , 2011, IEEE Trans. Mob. Comput..
[24] Murat Çakiroglu,et al. Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.
[25] Dario Pompili,et al. Three-dimensional and two-dimensional deployment analysis for underwater acoustic sensor networks , 2009, Ad Hoc Networks.
[26] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[27] M. Stojanovic,et al. Underwater acoustic networks , 2000, IEEE Journal of Oceanic Engineering.
[28] Wenyu Liu,et al. Localization and Synchronization for 3D Underwater Acoustic Sensor Networks , 2007, UIC.
[29] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[30] Mario Gerla,et al. Pressure Routing for Underwater Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[31] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[32] Bharat K. Bhargava,et al. Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks , 2005, WiSe '05.
[33] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[34] Shengli Zhou,et al. Localization for Large-Scale Underwater Sensor Networks , 2007, Networking.
[35] Jun-Hong Cui,et al. R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks , 2007, International Conference on Wireless Algorithms, Systems and Applications (WASA 2007).
[36] Jiejun Kong,et al. The challenges of building mobile underwater wireless networks for aquatic applications , 2006, IEEE Network.
[37] Ranjit Singh,et al. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.
[38] David P. Dobkin,et al. The quickhull algorithm for convex hulls , 1996, TOMS.
[39] I. Akyildiz,et al. A Resilient Routing Algorithm for Long-term Applications in Underwater Sensor Networks , 2006 .
[40] Dario Pompili,et al. Challenges for efficient communication in underwater acoustic sensor networks , 2004, SIGBED.
[41] Shengli Zhou,et al. Prospects and Problems of Wireless Communication for Underwater Sensor , 2008 .
[42] P. Venkata Krishna,et al. An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks , 2010, Comput. Math. Appl..
[43] Aung Htein Maw,et al. Wormhole Attack Detection in Wireless Sensor Networks , 2008 .
[44] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.