Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks
暂无分享,去创建一个
[1] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[2] Andrzej Lingas,et al. The do-all problem in broadcast networks , 2001, PODC '01.
[3] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[4] Andrea E. F. Clementi,et al. Optimal F-Reliable Protocols for the Do-All Problem on Single-Hop Wireless Networks , 2002, ISAAC.
[5] Andrzej Pelc,et al. Broadcasting with locally bounded Byzantine faults , 2005, Inf. Process. Lett..
[6] Mika Ståhlberg. Radio Jamming Attacks Against Two Popular Mobile Networks , 2000 .
[7] Andrea E. F. Clementi,et al. Selective families, superimposed codes, and broadcasting on unknown radio networks , 2001, SODA '01.
[8] Andrzej Pelc,et al. Fault-Tolerant Broadcasting in Radio Networks , 2001, J. Algorithms.
[9] Andrzej Pelc,et al. Feasibility and complexity of broadcasting with random transmission failures , 2005, PODC '05.
[10] Dariusz R. Kowalski,et al. On selection problem in radio networks , 2005, PODC '05.
[11] F. Jiang,et al. Exploiting the capture effect for collision detection and recovery , 2005, The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II..
[12] Andrea E. F. Clementi,et al. Round Robin is optimal for fault-tolerant broadcasting on wireless networks , 2001, J. Parallel Distributed Comput..
[13] Roy Friedman,et al. Efficient Byzantine broadcast in wireless ad-hoc networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[14] Nitin H. Vaidya,et al. Reliable broadcast in radio networks: the bounded collision case , 2006, PODC '06.
[15] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[16] Robert Metcalfe,et al. Ethernet: distributed packet switching for local computer networks , 1988, CACM.
[17] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[18] Timothy X. Brown,et al. Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.
[19] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[20] Nitin H. Vaidya,et al. On reliable broadcast in a radio network , 2005, PODC '05.
[21] Chiu-Yuen Koo,et al. Broadcast in radio networks tolerating byzantine adversarial behavior , 2004, PODC '04.
[22] Reuven Bar-Yehuda,et al. On the Time-Complexity of Broadcast in Multi-hop Radio Networks: An Exponential Gap Between Determinism and Randomization , 1992, J. Comput. Syst. Sci..