Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy
暂无分享,去创建一个
[1] Xin Liu,et al. SPREAD: Foiling Smart Jammers Using Multi-Layer Agility , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[2] Srdjan Capkun,et al. Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .
[3] Jean-Pierre Hubaux,et al. Security and Cooperation in Wireless Networks , 2007, ESAS.
[4] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[5] Ranjan K. Mallik,et al. Analysis of an on-off jamming situation as a dynamic game , 2000, IEEE Trans. Commun..
[6] Radha Poovendran,et al. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[7] Roger B. Myerson,et al. Game theory - Analysis of Conflict , 1991 .
[8] Andrzej Duda,et al. Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless LANs , 2005, SIGCOMM '05.
[9] Wenyuan Xu,et al. Anti-jamming timing channels for wireless networks , 2008, WiSec '08.
[10] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[11] Gang Zhou,et al. DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[12] Dan Rubenstein,et al. Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[13] Eitan Altman,et al. Jamming in wireless networks under uncertainty , 2009, WiOpt.
[14] Levente Buttyán,et al. Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .
[15] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[16] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..
[17] Eitan Altman,et al. A Jamming Game in Wireless Networks with Transmission Cost , 2007, NET-COOP.
[18] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[19] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[20] M. Hall,et al. Effect of pulse jamming on IEEE 802.11 wireless LAN performance , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[21] David J. Thuente,et al. Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .
[22] Christian Scheideler,et al. A jamming-resistant MAC protocol for single-hop wireless networks , 2008, PODC '08.
[23] Anthony Ephremides,et al. A game-theoretic analysis of denial of service attacks in wireless random access , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.
[24] Peng Cheng,et al. On the Performance of IEEE 802.16 OFDMA System Under Different Frequency Reuse and Subcarrier Permutation Patterns , 2007, 2007 IEEE International Conference on Communications.