Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System
暂无分享,去创建一个
[1] Andy Hopper,et al. The active badge location system , 1992, TOIS.
[2] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[3] Ed. McKenzie. 10. Time Series Analysis by Higher Order Crossings , 1996 .
[4] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[5] Gang Zhou,et al. RID: radio interference detection in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[6] Srdjan Capkun,et al. Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .
[7] Srdjan Capkun,et al. Detection of reactive jamming in sensor networks , 2010, TOSN.
[8] Marimuthu Palaniswami,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.
[9] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[10] Richard P. Martin,et al. The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study , 2006, DCOSS.
[11] Gruia-Catalin Roman,et al. Consistent group membership in ad hoc networks , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[12] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[13] Ronald R. Yager,et al. Fuzzy sets, neural networks, and soft computing , 1994 .
[14] Behrouz A. Forouzan,et al. Data Communications and Networking , 2000 .
[15] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[16] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[17] Ebrahim H. Mamdani,et al. An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller , 1999, Int. J. Hum. Comput. Stud..
[18] King Lun Yiu. Ad-hoc positioning system , 2008 .
[19] Leszek Rutkowski,et al. Neural Networks and Soft Computing , 2003 .
[20] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[21] Chuen-Tsai Sun,et al. Neuro-fuzzy And Soft Computing: A Computational Approach To Learning And Machine Intelligence [Books in Brief] , 1997, IEEE Transactions on Neural Networks.
[22] Urbashi Mitra,et al. Boundary Estimation in Sensor Networks: Theory and Methods , 2003, IPSN.
[23] Murat Çakiroglu,et al. Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.
[24] Christian F. Tschudin,et al. Coping with communication gray zones in IEEE 802.11b based ad hoc networks , 2002, WOWMOM '02.
[25] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[26] F. Golatowski,et al. Weighted Centroid Localization in Zigbee-based Sensor Networks , 2007, 2007 IEEE International Symposium on Intelligent Signal Processing.
[27] Leonidas J. Guibas,et al. Collaborative signal and information processing: an information-directed approach , 2003 .
[28] George Dimitoglou,et al. Using Standard Deviation in Signal Strength Detection to Determine Jamming in Wireless Networks , 2008, CAINE.
[29] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[30] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[31] Richard P. Martin,et al. A Practical Approach to Landmark Deployment for Indoor Localization , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[32] Gang Zhou,et al. DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[33] Guevara Noubir,et al. Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.
[34] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[35] Tian He,et al. Range-free localization schemes in large scale sensor network , 2003, MobiCom 2003.
[36] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[37] Lisa Ann Osadciw,et al. Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.