Security threats to the MAC-layer in wireless networks
暂无分享,去创建一个
[1] Laurent Massoulié,et al. Greening the internet with nano data centers , 2009, CoNEXT '09.
[2] Wanjiun Liao,et al. A practical QoS solution to voice over IP in IEEE 802.11 WLANs , 2009, IEEE Communications Magazine.
[3] Martin Heusse,et al. Performance anomaly of 802.11b , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[4] Todor Cooklev,et al. Air Interface for Fixed Broadband Wireless Access Systems , 2004 .
[5] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[6] John C. Bicket,et al. Bit-rate selection in wireless networks , 2005 .
[7] Nitin H. Vaidya,et al. On physical carrier sensing in wireless ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[8] Jihyuk Choi,et al. Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots , 2011, 2011 IEEE International Conference on Communications (ICC).
[9] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[10] Massimo Bernaschi,et al. Access points vulnerabilities to DoS attacks in 802.11 networks , 2008, Wirel. Networks.
[11] Samir Ranjan Das,et al. Detecting selfish carrier-sense behavior in WiFi networks by passive monitoring , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[12] Hongqiang Zhai,et al. Physical Carrier Sensing and Spatial Reuse in Multirate and Multihop Wireless Ad Hoc Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[13] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[14] Helen J. Wang,et al. Preserving location privacy in wireless lans , 2007, MobiSys '07.
[15] Kjell Jørgen Hole,et al. Securing Wi-Fi Networks , 2005, Computer.
[16] Hyuk Lim,et al. Optimal physical carrier sense in wireless networks , 2011, Ad Hoc Networks.
[17] Bruce Potter. Wireless hotspots , 2006, Commun. ACM.
[18] John S. Baras,et al. Performance Comparison of Detection Schemes for MAC Layer Misbehavior , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[19] Jihyuk Choi,et al. Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks , 2010, SecureComm.
[20] Vasilios A. Siris,et al. Optimal CWmin selection for achieving proportional fairness in multi-rate 802.11e WLANs: test-bed implementation and evaluation , 2006, WINTECH.
[21] John Ioannidis,et al. A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP) , 2004, TSEC.
[22] Jerzy Konorski. A game-theoretic study of CSMA/CA under a backoff attack , 2006, TNET.
[23] Hui Luo,et al. WiFi: what's next? , 2002, IEEE Commun. Mag..
[24] Songqing Chen,et al. SCAP: Smart Caching inWireless Access Points to Improve P2P Streaming , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[25] Sandeep K. S. Gupta,et al. Reliable multicast MAC protocol for wireless LANs , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[26] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[27] Leo Monteban,et al. WaveLAN®-II: A high-performance wireless LAN for the unlicensed band , 1997, Bell Labs Technical Journal.