Mitigation of Control Channel Jamming under Node Capture Attacks
暂无分享,去创建一个
[1] Robert B. Ash,et al. Information Theory , 2020, The SAGE International Encyclopedia of Mass Media and Society.
[2] P. Erdös,et al. Families of finite sets in which no set is covered by the union ofr others , 1985 .
[3] H. N. Nagaraja,et al. Order Statistics, Third Edition , 2005, Wiley Series in Probability and Statistics.
[4] Gordon L. Stuber,et al. Principles of Mobile Communication , 1996 .
[5] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[6] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[7] K. Fazel,et al. Multi-Carrier and Spread Spectrum Systems: Fazel/Spread Spectrum , 2004 .
[8] Reinhard Diestel,et al. Graph Theory , 1997 .
[9] Srdjan Capkun,et al. Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .
[10] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[11] L. Goddard. Information Theory , 1962, Nature.
[12] Radha Poovendran,et al. Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.
[13] Feller William,et al. An Introduction To Probability Theory And Its Applications , 1950 .
[14] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[15] Xin Liu,et al. Broadcast Control Channel Jamming: Resilience and Identification of Traitors , 2007, 2007 IEEE International Symposium on Information Theory.
[16] Radha Poovendran,et al. A canonical seed assignment model for key predistribution in wireless sensor networks , 2007, TOSN.
[17] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[18] Wenyuan Xu,et al. Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[19] Theodore S. Rappaport,et al. Wireless Communications -- Principles and Practice, Second Edition. (The Book End) , 2002 .
[20] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[21] Khaled Fazel,et al. Multi-Carrier and Spread Spectrum Systems , 2003 .
[22] Joong Soo Ma,et al. Mobile Communications , 2003, Lecture Notes in Computer Science.
[23] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[24] Herbert A. David,et al. Order Statistics , 2011, International Encyclopedia of Statistical Science.
[25] Radha Poovendran,et al. Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.
[26] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.