Dynamic Adaptive Anti-Jamming via Controlled Mobility
暂无分享,去创建一个
Peng Ning | Xiaofan He | Huaiyu Dai | P. Ning | H. Dai | Xiaofan He
[1] Peng Ning,et al. Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks , 2012, IEEE Transactions on Signal Processing.
[2] Peng Ning,et al. Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.
[3] David Kempe,et al. A decentralized algorithm for spectral analysis , 2008, J. Comput. Syst. Sci..
[4] Wenyuan Xu,et al. Anti-jamming timing channels for wireless networks , 2008, WiSec '08.
[5] Srikanth V. Krishnamurthy,et al. Lightweight Jammer Localization in Wireless Networks: System Design and Implementation , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[6] Scott D. Coutts. Passive localization of moving emitters using out-of-plane multipath , 2000, IEEE Trans. Aerosp. Electron. Syst..
[7] Sushil Jajodia,et al. Moving Target Defense II , 2013, Advances in Information Security.
[8] Guosen Yue,et al. Anti-jamming coding techniques with application to cognitive radio , 2009, IEEE Transactions on Wireless Communications.
[9] Tao Jin,et al. Zero pre-shared secret key establishment in the presence of jammers , 2009, MobiHoc '09.
[10] Devavrat Shah,et al. Product Multicommodity Flow in Wireless Networks , 2006, IEEE Transactions on Information Theory.
[11] Jochen Könemann,et al. Faster and Simpler Algorithms for Multicommodity Flow and Other Fractional Packing Problems , 2007, SIAM J. Comput..
[12] Patrick Tague,et al. Improving anti-jamming capability and increasing jamming impact with mobility control , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).
[13] Ieee Staff,et al. 2013 IEEE Conference on Communications and Network Security (CNS) , 2013 .
[14] Fan Chung,et al. Spectral Graph Theory , 1996 .
[15] Zhu Han,et al. Dogfight in Spectrum: Jamming and Anti-Jamming in Multichannel Cognitive Radio Systems , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[16] Guevara Noubir,et al. Linear programming models for jamming attacks on network traffic flows , 2008, WiOpt 2008.
[17] Frank Thomson Leighton,et al. Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms , 1999, JACM.
[18] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[19] D. R. Fulkerson,et al. Maximal Flow Through a Network , 1956 .
[20] Xiang-Yang Li,et al. Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication , 2012, IEEE Journal on Selected Areas in Communications.
[21] Wenyuan Xu,et al. Exploiting Jamming-Caused Neighbor Changes for Jammer Localization , 2012, IEEE Transactions on Parallel and Distributed Systems.
[22] J. A. Tomlin,et al. Minimum-Cost Multicommodity Network Flows , 1966, Oper. Res..
[23] Peng Ning,et al. BitTrickle: Defending against broadband and high-power reactive jamming attacks , 2012, 2012 Proceedings IEEE INFOCOM.
[24] Srdjan Capkun,et al. Anti-jamming broadcast communication using uncoordinated spread spectrum techniques , 2010, IEEE Journal on Selected Areas in Communications.
[25] Franz S. Hover,et al. Laplacians for flow networks , 2011, SIAM J. Discret. Math..
[26] Srdjan Capkun,et al. Jamming-resistant Broadcast Communication without Shared Keys , 2009, USENIX Security Symposium.
[27] D. West. Introduction to Graph Theory , 1995 .
[28] Ruey-Wen Liu,et al. Anti-jamming filtering in the autocorrelation domain , 2004, IEEE Signal Processing Letters.
[29] Wade Trappe,et al. Managing the Mobility of a Mobile Sensor Network Using Network Dynamics , 2008, IEEE Transactions on Parallel and Distributed Systems.
[30] Jonah Sherman,et al. Breaking the Multicommodity Flow Barrier for O(vlog n)-Approximations to Sparsest Cut , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[31] Rudra Dutta,et al. A routing approach to jamming mitigation in wireless multihop networks , 2011, 2011 18th IEEE Workshop on Local & Metropolitan Area Networks (LANMAN).
[32] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[33] Peng Ning,et al. USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).
[34] Peng Ning,et al. Dynamic Adaptive Anti-Jamming via Mobility Control , 2013 .
[35] Peng Ning,et al. Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure , 2010, ACSAC '10.
[36] Jie Lin,et al. Towards mobility as a network control primitive , 2004, MobiHoc '04.
[37] Andrea Goldsmith,et al. Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).
[38] K. J. Ray Liu,et al. An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.
[39] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[40] Tamer Basar,et al. Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).