Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
暂无分享,去创建一个
Yee Wei Law | Pieter H. Hartel | Paul J. M. Havinga | Jeroen Doumen | L.F.W. van Hoesel | Lodewijk van Hoesel | P. Hartel | J. Doumen | P. Havinga
[1] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[2] R. Curtis. A course in combinatorics (2nd edn), by J. H. van Lint and R. M. Wilson. Pp. 602. £24.95. 2001. ISBN 0 521 00601 5 (Cambridge University Press). , 2003, The Mathematical Gazette.
[3] Jerzy Konorski,et al. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations , 2002, NETWORKING.
[4] Y. C. Tay,et al. Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks , 2006, EWSN.
[5] David L. Adamy,et al. EW 102: A Second Course in Electronic Warfare , 2004 .
[6] Moustafa Youssef,et al. Energy-Aware TDMA-Based MAC for Sensor Networks , 2002 .
[7] Paul J.M. Havinga,et al. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches , 2004 .
[8] Roger L. Peterson,et al. Introduction to Spread Spectrum Communications , 1995 .
[9] Ramesh Govindan,et al. Understanding packet delivery performance in dense wireless sensor networks , 2003, SenSys '03.
[10] David E. Culler,et al. Mica: A Wireless Platform for Deeply Embedded Networks , 2002, IEEE Micro.
[11] Saurabh Ganeriwal,et al. On Cheating in CSMA/CA Ad Hoc Networks , 2004 .
[12] John S. Baras,et al. Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.
[13] D. Curtis Schleher,et al. Electronic Warfare in the Information Age , 1999 .
[14] Richard Zurawski,et al. Embedded Systems Handbook , 2004 .
[15] Manuel Blum,et al. Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.
[16] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[17] David E. Culler,et al. Versatile low power media access for wireless sensor networks , 2004, SenSys '04.
[18] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[19] Don J. Torrieri,et al. Fundamental limitations on repeater jamming of frequency-hopping communications , 1989, IEEE J. Sel. Areas Commun..
[20] Paul J.M. Havinga,et al. Design of a low-power testbed for Wireless Sensor Networks and verification , 2003 .
[21] Christian C. Enz,et al. Poster abstract: wiseMAC, an ultra low power MAC protocol for the wiseNET wireless sensor network , 2003, SenSys '03.
[22] Bhaskar Krishnamachari,et al. An adaptive energy-efficient and low-latency MAC for data gathering in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[23] Koen Langendoen,et al. An adaptive energy-efficient MAC protocol for wireless sensor networks , 2003, SenSys '03.
[24] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[25] Marco Zuniga,et al. Analyzing the transitional region in low power wireless links , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[26] Jennifer C. Hou,et al. On deriving the upper bound of α-lifetime for large sensor networks , 2004, MobiHoc '04.
[27] Mika Ståhlberg. Radio Jamming Attacks Against Two Popular Mobile Networks , 2000 .
[28] Richard M. Wilson,et al. A course in combinatorics , 1992 .
[29] Nitin H. Vaidya,et al. A Power Control MAC Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[30] Jing Li,et al. A bit-map-assisted energy-efficient MAC scheme for wireless sensor networks , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[31] Deborah Estrin,et al. Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.
[32] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[33] Liesbet Van der Perre,et al. Optimizing transmission and shutdown for energy-efficient packet scheduling in sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[34] Henry Samueli,et al. Analysis and design of a frequency-hopped spread-spectrum transceiver for wireless personal communications , 2000, IEEE Trans. Veh. Technol..
[35] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[36] Sandeep S. Kulkarni,et al. TDMA service for sensor networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[37] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[38] Deborah Estrin,et al. Directed diffusion for wireless sensor networking , 2003, TNET.
[39] Gregory J. Pottie,et al. Wireless integrated network sensors: toward low-cost and robust self-organizing security networks , 1999, Other Conferences.
[40] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[41] P.J.M. Havinga,et al. AI-LMAC: an adaptive, information-centric and lightweight MAC protocol for wireless sensor networks , 2004, Proceedings of the 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004..
[42] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[43] Deborah Estrin,et al. An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[44] Wenyuan Xu,et al. Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[45] Paul J.M. Havinga,et al. DCOS, a real-time light-weight Data Centric Operating System , 2004 .
[46] Amre El-Hoiydi,et al. Aloha with preamble sampling for sporadic traffic in ad hoc wireless sensor networks , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[47] Shivakant Mishra,et al. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks , 2006, Pervasive Mob. Comput..
[48] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[49] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[50] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[51] C. Chien,et al. Low power TDMA in large wireless sensor networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[52] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[53] Donald B. Rubin,et al. Max-imum Likelihood from Incomplete Data , 1972 .
[54] Guevara Noubir,et al. Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.
[55] Guevara Noubir,et al. On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility , 2004, WWIC.
[56] Koen Langendoen,et al. Link layer measurements in sensor networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).
[57] Katia Obraczka,et al. Energy-efficient collision-free medium access control for wireless sensor networks , 2003, SenSys '03.
[58] Richard E. Overill,et al. Foundations of Cryptography: Basic Tools , 2002, J. Log. Comput..
[59] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.