On trigger detection against reactive Jamming Attacks: A clique-independent set based approach
暂无分享,去创建一个
Ying Xuan | My T. Thai | Yilin Shen | Incheol Shin | M. Thai | Yilin Shen | Ying Xuan | Incheol Shin
[1] Murat Çakiroglu,et al. Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.
[2] Taieb Znati,et al. Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes , 2009, FOWANC '09.
[3] Othman Sidek,et al. Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment , 2008 .
[4] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[5] Srdjan Capkun,et al. Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .
[6] Srdjan Capkun,et al. Detection of Reactive Jamming in Sensor Networks , 2009 .
[7] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[8] Jean Walrand,et al. Maximal Cliques in Unit Disk Graphs: Polynomial Approximation , 2006 .
[9] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[10] Jingbo Guo,et al. Feasibility Assessment of Repeater Jamming Technique for DSSS , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[11] Mikhail J. Atallah,et al. Indexing Information for Data Forensics , 2005, ACNS.
[12] C. Pandu Rangan,et al. Algorithmic aspects of clique-transversal and clique-independent sets , 2000, Discret. Appl. Math..
[13] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[14] Wang Zanji,et al. Performance of DSSS against Repeater Jamming , 2006, 2006 13th IEEE International Conference on Electronics, Circuits and Systems.
[15] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[16] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[17] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.