Capacity of Large-Scale Wireless Networks Under Jamming: Modeling and Analyses
暂无分享,去创建一个
Satyajayant Misra | Rafael Asorey-Cacheda | Yousef Jaradat | Mohammad Z. Masoud | Ismael Jannoud | Amjad Abu-Baker | Hong Huang | Reza Tourani | S. Misra | R. Asorey-Cacheda | Hong Huang | R. Tourani | M. Masoud | Ismael Jannoud | Amjad Abu-Baker | Yousef Jaradat
[1] Gang Zhou,et al. DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[2] Elaine Shi,et al. Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[3] Jeffrey G. Andrews,et al. Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[4] Guevara Noubir,et al. Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.
[5] M.Z. Win,et al. Physical-layer security in stochastic wireless networks , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.
[6] Panganamala Ramana Kumar,et al. On the path-loss attenuation regime for positive cost and linear scaling of transport capacity in wireless networks , 2006, IEEE Transactions on Information Theory.
[7] Hong Huang,et al. On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network , 2011, IEEE Transactions on Wireless Communications.
[8] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[9] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[10] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[11] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[12] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[13] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[14] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[15] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[16] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[17] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[18] Moe Z. Win,et al. Wireless physical-layer security: The case of colluding eavesdroppers , 2009, 2009 IEEE International Symposium on Information Theory.
[19] Ayfer Özgür,et al. Scaling Laws for One- and Two-Dimensional Random Wireless Networks in the Low-Attenuation Regime , 2007, IEEE Transactions on Information Theory.
[20] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[21] Ayfer Özgür,et al. Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks , 2006, IEEE Transactions on Information Theory.
[22] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.
[23] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.
[24] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[25] Guevara Noubir,et al. Linear programming models for jamming attacks on network traffic flows , 2008, WiOpt 2008.
[26] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[27] Xiangyun Zhou,et al. Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.
[28] Satyajayant Misra,et al. Measures and Countermeasures for Null Frequency Jamming of On-Demand Routing Protocols in Wireless Ad Hoc Networks , 2012, IEEE Transactions on Wireless Communications.
[29] Xin Liu,et al. Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.
[30] Ranjan K. Mallik,et al. Analysis of an on-off jamming situation as a dynamic game , 2000, IEEE Trans. Commun..
[31] Emre Telatar,et al. Information theoretic upper bounds on the capacity of large extended ad-hoc wireless networks , 2004, ISIT.
[32] Panganamala Ramana Kumar,et al. The transport capacity of wireless networks over fading channels , 2004, IEEE Transactions on Information Theory.
[33] Liang-Liang Xie,et al. Network information theory for wireless communications , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[34] Martin Haenggi. The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.
[35] D. Curtis Schleher,et al. Electronic Warfare in the Information Age , 1999 .
[36] Yih-Chun Hu,et al. Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks , 2007, IEEE/ACM Transactions on Networking.
[37] Venkatesh Saligrama,et al. Wireless Ad Hoc Networks: Strategies and Scaling Laws for the Fixed SNR Regime , 2006, IEEE Transactions on Information Theory.
[38] P. Viswanath,et al. Upper bounds to transport capacity of wireless networks , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[39] Massimo Franceschetti,et al. Closing the Gap in the Capacity of Wireless Networks Via Percolation Theory , 2007, IEEE Transactions on Information Theory.
[40] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.