Detection of Fabricated CTS Packet Attacks in Wireless LANs
暂无分享,去创建一个
[1] John S. Baras,et al. A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.
[2] Pramod K. Varshney,et al. Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming , 2003 .
[3] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[4] David Starobinski,et al. RTS/CTS-induced congestion in ad hoc wireless LANs , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[5] Radha Poovendran,et al. Analytic evaluation of target detection in heterogeneous wireless sensor networks , 2009, TOSN.
[6] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[7] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[8] Srdjan Capkun,et al. Detection of reactive jamming in sensor networks , 2010, TOSN.
[9] Yunhao Liu,et al. Rendered Path: Range-Free Localization in Anisotropic Sensor Networks With Holes , 2007, IEEE/ACM Transactions on Networking.
[10] Loukas Lazos,et al. Selective Jamming Attacks in Wireless Networks , 2010, 2010 IEEE International Conference on Communications.
[11] Meikang Qiu,et al. Jamming ACK Attack to Wireless Networks and a Mitigation Approach , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[12] Frank Stajano,et al. The Resurrecting Duckling: security issues for ubiquitous computing , 2002, S&P 2002.
[13] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[14] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[15] John S. Baras,et al. Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers , 2007, J. Comput. Secur..
[16] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[17] Reza Curtmola,et al. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.
[18] Ying Xuan,et al. On trigger detection against reactive Jamming Attacks: A clique-independent set based approach , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.
[19] Michel Barbeau,et al. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.
[20] Christian Scheideler,et al. A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks , 2010, DISC.
[21] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.