Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
暂无分享,去创建一个
[1] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[2] Jie Lin,et al. Towards mobility as a network control primitive , 2004, MobiHoc '04.
[3] Andrej Bogdanov,et al. Power-aware base station positioning for sensor networks , 2004, IEEE INFOCOM 2004.
[4] Qiang Wang,et al. Performance of fast frequency hopped noncoherent MFSK with a fixed hop rate under worst case jamming , 1989, IEEE Military Communications Conference, 'Bridging the Gap. Interoperability, Survivability, Security'.
[5] David E. Culler,et al. The mote revolution: low power wireless sensor network devices , 2004 .
[6] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[7] Jie Wu,et al. SMART: a scan-based movement-assisted sensor deployment method in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[8] Ellen W. Zegura,et al. A message ferrying approach for data delivery in sparse mobile ad hoc networks , 2004, MobiHoc '04.
[9] Guevara Noubir,et al. Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.
[10] Guevara Noubir,et al. On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility , 2004, WWIC.
[11] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[12] Shivakant Mishra,et al. Enhancing Base Station Security in Wireless Sensor Networks , 2003 .
[13] Mani B. Srivastava,et al. Mobile element scheduling for efficient data collection in wireless sensor networks with dynamic deadlines , 2004, 25th IEEE International Real-Time Systems Symposium.
[14] E. B. Felstead,et al. Anti-jam by fast FH NCFSK-myths and realities , 1993, Proceedings of MILCOM '93 - IEEE Military Communications Conference.
[15] Martin Vetterli,et al. Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[16] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[17] Shivakant Mishra,et al. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[18] Qiang Wang,et al. Performance of fast frequency hopped noncoherent MESK with a fixed hop rate under worst case jamming , 1990, IEEE Trans. Commun..
[19] Peter Scheuermann,et al. Mission-critical management of mobile sensors: or, how to guide a flock of sensors , 2004, DMSN '04.
[20] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[21] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[22] Zygmunt J. Haas,et al. The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way) , 2003, MobiHoc '03.
[23] David E. Culler,et al. The Emergence of Networking Abstractions and Techniques in TinyOS , 2004, NSDI.
[24] William A. Arbaugh,et al. Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.
[25] Ellen W. Zegura,et al. Controlling the mobility of multiple data transport ferries in a delay-tolerant network , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[26] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[27] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[28] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[29] Deborah Estrin,et al. Intelligent fluid infrastructure for embedded networks , 2004, MobiSys '04.
[30] Deborah Estrin,et al. Time synchronization for wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.
[31] Thomas F. La Porta,et al. Movement-assisted sensor deployment , 2004, IEEE INFOCOM 2004.
[32] Thomas F. La Porta,et al. Sensor relocation in mobile sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[33] Qiang Huang,et al. Modeling of distributed denial of service attacks in wireless networks , 2003, 2003 IEEE Pacific Rim Conference on Communications Computers and Signal Processing (PACRIM 2003) (Cat. No.03CH37490).
[34] George Kesidis,et al. Purposeful mobility for relaying and surveillance in mobile ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[35] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[36] Sencun Zhu,et al. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks , 2005, MobiHoc '05.
[37] Waylon Brunette,et al. Data MULEs: modeling a three-tier architecture for sparse sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..