A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication
暂无分享,去创建一个
[1] Jingjing Huang,et al. Dynamic secret key generation exploiting Ultra-wideband wireless channel characteristics , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[2] Christof Paar,et al. Security Analysis of Quantization Schemes for Channel-based Key Extraction , 2015, EAI Endorsed Trans. Security Safety.
[3] Yi Luo,et al. Analysis of the information theoretically secret key agreement by public discussion , 2015, Secur. Commun. Networks.
[4] Christof Paar,et al. Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).
[5] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[6] Yao Liu,et al. Randomized positioning DSSS for anti-jamming wireless communications , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).
[7] Mitko Bogdanoski,et al. Analysis of the WSN MAC Protocols under Jamming DoS Attack , 2014, Int. J. Netw. Secur..
[8] Wade Trappe,et al. ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.
[9] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[10] Xiaodai Dong,et al. Verification of Secret Key Generation from UWB Channel Observations , 2009, 2009 IEEE International Conference on Communications.
[11] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[12] Gregory D. Durgin,et al. Space-Time Wireless Channels , 2002 .
[13] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[14] Zhijie Jerry Shi,et al. RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements , 2016, IEEE Communications Magazine.
[15] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[16] Rami G. Melhem,et al. Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks , 2008, MobiQuitous.
[17] Jie Yang,et al. Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[18] Satish Vadlamani,et al. Jamming attacks on wireless networks: A taxonomic survey , 2016 .
[19] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[20] Kui Ren,et al. Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.
[21] Alvin S. Lim,et al. Jamming and anti-jamming techniques in wireless networks: a survey , 2014, Int. J. Ad Hoc Ubiquitous Comput..
[22] Jin-Fu Chang,et al. Using frequency hopping spread spectrum technique to combat multipath interference in a multiaccessing environment , 1994 .
[23] Gang Zhou,et al. DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[24] Dan Rubenstein,et al. Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[25] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[26] Peng Ning,et al. USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).
[27] M. Sundarambal,et al. Channel selection strategy for jamming-resistant reactive frequency hopping in Cognitive WiFi network , 2015, 2015 International Conference on Soft-Computing and Networks Security (ICSNS).