A survey on jamming attacks and countermeasures in WSNs
暂无分享,去创建一个
Charalampos Konstantopoulos | Aristides Mpitziopoulos | Damianos Gavalas | Grammati E. Pantziou | D. Gavalas | G. Pantziou | C. Konstantopoulos | Aristides Mpitziopoulos
[1] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[2] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[3] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[4] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.
[5] Nitin H. Vaidya,et al. Medium access control protocols using directional antennas in ad hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[6] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[7] G. Thiele,et al. Antenna theory and design , 1981 .
[8] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[9] Yoan Shin,et al. Multipath characteristics of impulse radio channels , 2000, VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).
[10] Henry Samueli,et al. Analysis and design of a frequency-hopped spread-spectrum transceiver for wireless personal communications , 2000, IEEE Trans. Veh. Technol..
[11] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[12] TRANSPORT LAYER AND SECURITY PROTOCOLS FOR AD HOC WIRELESS NETWORKS , 2004 .
[13] Somprakash Bandyopadhyay,et al. Multipath Routing in Ad Hoc Wireless Networks with Omni Directional and Directional Antenna: A Comparative Study , 2002, IWDC.
[14] W. H. Martin. Decibel — The name for the transmission unit , 1929 .
[15] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[16] Sang Hyuk Son,et al. Wireless Sensor Networks for In-Home Healthcare: Potential and Challenges , 2005 .
[17] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[18] Yee Wei Law,et al. How to Secure a Wireless Sensor Network , 2005, 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[19] Özgür B. Akan,et al. Multimedia communication in wireless sensor networks , 2005, Ann. des Télécommunications.
[20] D. Curtis Schleher,et al. Electronic Warfare in the Information Age , 1999 .
[21] Ahmed Karmouch,et al. Mobile software agents: an overview , 1998, IEEE Commun. Mag..
[22] Don J. Torrieri,et al. Fundamental limitations on repeater jamming of frequency-hopping communications , 1989, IEEE J. Sel. Areas Commun..
[23] S. Bandyopadhyay,et al. An adaptive MAC and idrectional routing protocol for ad hoc wireless network using ESPAR antenna , 2001, MobiHoc '01.
[24] Charalampos Konstantopoulos,et al. Defending Wireless Sensor Networks from Jamming Attacks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.
[25] Guevara Noubir,et al. On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility , 2004, WWIC.
[26] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[27] J. Gardner,et al. Microsensors, MEMS, and Smart Devices , 2001 .
[28] Gang Zhou,et al. RID: radio interference detection in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[29] Martin Reisslein,et al. A survey of multimedia streaming in wireless sensor networks , 2008, IEEE Communications Surveys & Tutorials.
[30] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[31] Burton S. Kaliski,et al. PKCS #5: Password-Based Cryptography Specification Version 2.0 , 2000, RFC.
[32] Radha Poovendran,et al. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[33] Wenyuan Xu,et al. Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[34] John G. Proakis,et al. Digital Communications , 1983 .
[35] Gregory J. Pottie,et al. Wireless integrated network sensors: toward low-cost and robust self-organizing security networks , 1999, Other Conferences.
[36] Gyula Simon,et al. The flooding time synchronization protocol , 2004, SenSys '04.
[37] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[38] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[39] Paul J.M. Havinga,et al. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches , 2004 .
[40] Ram Ramanathan,et al. On the performance of ad hoc networks with beamforming antennas , 2001, MobiHoc '01.
[41] Ram Ramanathan. On the performance of ad hoc networks with beamforming antennas , 2001, MobiHoc.
[42] Ian F. Akyildiz,et al. A survey on wireless multimedia sensor networks , 2007, Comput. Networks.
[43] Cauligi S. Raghavendra,et al. Energy efficient communications in ad hoc networks using directional antennas , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[44] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[45] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[46] Gang Zhou,et al. DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[47] Sunita Ram,et al. The people sensor: a mobility aid for the visually impaired , 1998, Digest of Papers. Second International Symposium on Wearable Computers (Cat. No.98EX215).
[48] David L. Adamy,et al. EW 102: A Second Course in Electronic Warfare , 2004 .
[49] Yang Li,et al. Analysis of multipath routing for ad hoc networks using directional antennas , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[50] Somprakash Bandyopadhyay,et al. An adaptive MAC and idrectional routing protocol for ad hoc wireless network using ESPAR antenna , 2001, MobiHoc.
[51] J. Gardner,et al. Microsensors, MEMS, and Smart Devices: Gardner/Microsensors, MEMS, and Smart Devices , 2001 .
[52] Abdelsalam Helal,et al. Drishti: an integrated indoor/outdoor blind navigation system and service , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[53] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[54] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[55] Takuji Nishimura,et al. Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.
[56] Parameswaran Ramanathan,et al. Distributed target classification and tracking in sensor networks , 2003 .
[57] Kai-Ten Feng. LMA: Location- and Mobility-Aware Medium-Access Control Protocols for Vehicular Ad Hoc Networks Using Directional Antennas , 2007, IEEE Transactions on Vehicular Technology.
[58] Liesbet Van der Perre,et al. Optimizing transmission and shutdown for energy-efficient packet scheduling in sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[59] Ian Oppermann,et al. UWB wireless sensor networks: UWEN - a practical example , 2004, IEEE Communications Magazine.
[60] Charalampos Konstantopoulos,et al. JAID: An algorithm for data fusion and jamming avoidance on distributed sensor networks , 2009, Pervasive Mob. Comput..
[61] Moe Z. Win,et al. Impulse radio multipath characteristics and diversity reception , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).
[62] A. F. Mohammed. Near-far problem in direct-sequence code-division multiple-access systems , 1993 .
[63] F. Gross. Smart Antennas for Wireless Communications: With MATLAB , 2005 .
[64] Lisa Ann Osadciw,et al. Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.
[65] Srdjan Capkun,et al. Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .
[66] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[67] Marimuthu Palaniswami,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.
[68] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[69] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .