A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks
暂无分享,去创建一个
[1] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[2] Colin O'Flynn,et al. Message Denial and Alteration on IEEE 802.15.4 Low-Power Radio Networks , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[3] Sisi Liu,et al. Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.
[4] Gianluca Dini,et al. On experimentally evaluating the impact of security on IEEE 802.15.4 networks , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[5] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[6] Marco Tiloca,et al. MAC Implementation for TinyOS 2 . 1 , 2011 .
[7] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[8] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[9] Guevara Noubir,et al. Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.
[10] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[11] I. Korkmaz,et al. On the IEEE 802.15.4 MAC Layer Attacks: GTS Attack , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).
[12] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[13] Yang Bo. Transplantation of Embedded Operating System Tinyos for Wireless Sensor Network Nodes , 2011 .
[14] Eduardo Tovar,et al. GTS allocation analysis in IEEE 802.15.4 for real-time wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[15] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[16] Gang Zhou,et al. DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[17] David E. Culler,et al. Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.
[18] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[19] Loukas Lazos,et al. Selective Jamming Attacks in Wireless Networks , 2010, 2010 IEEE International Conference on Communications.
[20] Roberta Daidone. Experimental evaluations of security impact on IEEE 802.15.4 networks , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[21] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[22] Orhan Dagdeviren,et al. GTS Attack: An IEEE 802.15.4 MAC Layer Attack in Wireless Sensor Networks , 2009 .