A Jammer Deployment Method for Multi-hop Wireless Network Based on Degree Distribution
暂无分享,去创建一个
Xianglin Wei | Jianhua Fan | Baoqiang Kan | Yongyang Hu | Xianglin Wei | Jianhua Fan | Yongyang Hu | B. Kan
[1] J. H. Fan,et al. Interference activity aware multi-path routing protocol , 2012, EURASIP J. Wirel. Commun. Netw..
[2] Xiaodong Wang,et al. Jamming attack in WSN: a spatial perspective , 2011, UbiComp '11.
[3] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[4] Bao-Qiang Kan,et al. Interference activity aware multi-path routing protocol , 2012 .
[5] Triet Vo Huu,et al. Counter-jamming using mixed mechanical and software interference cancellation , 2013, WiSec '13.
[6] Sisi Liu,et al. Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.
[7] Yuan Xue,et al. Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks , 2011, J. Netw. Comput. Appl..
[8] Srdjan Capkun,et al. Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .
[9] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[10] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[11] Radha Poovendran,et al. Mitigation of Control Channel Jamming under Node Capture Attacks , 2009, IEEE Transactions on Mobile Computing.
[12] Mithun Acharya,et al. Intelligent Jamming in 802 . 11 b Wireless Networks , 2004 .
[13] Wenyuan Xu,et al. Anti-jamming timing channels for wireless networks , 2008, WiSec '08.
[14] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[15] ZhangJin,et al. An efficient and fair MAC protocol robust to reactive interference , 2013 .
[16] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[17] Christian Scheideler,et al. An Efficient and Fair MAC Protocol Robust to Reactive Interference , 2013, IEEE/ACM Transactions on Networking.
[18] Yuan Xue,et al. Taxonomy for description of cross-domain attacks on CPS , 2013, HiCoNS '13.
[19] Elaine Shi,et al. Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[20] Srinivasan Seshan,et al. Understanding and mitigating the impact of RF interference on 802.11 networks , 2007, SIGCOMM 2007.
[21] Timothy X. Brown,et al. Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.
[22] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.