Launching denial-of-service jamming attacks in underwater sensor networks
暂无分享,去创建一个
[1] L. Freitag,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE JOURNAL OF OCEANIC ENGINEERING 1 Peer-Reviewed Technical Communication Multicarrier Communication Over Un , 2022 .
[2] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[3] Robert J. Urick,et al. Principles of underwater sound , 1975 .
[4] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[5] Bharat K. Bhargava,et al. Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks , 2005, WiSe '05.
[6] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[7] Zhou Shengli,et al. Prospects and problems of wireless communication for underwater sensor networks , 2008 .
[8] Shengli Zhou,et al. Prospects and Problems of Wireless Communication for Underwater Sensor , 2008 .
[9] Jiejun Kong,et al. The challenges of building mobile underwater wireless networks for aquatic applications , 2006, IEEE Network.
[10] Hao Zhou,et al. DSP based receiver implementation for OFDM acoustic modems , 2012, Phys. Commun..
[11] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[12] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[13] Bharat K. Bhargava,et al. Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .