An Effective Suppression Method for 802.11 Transmission with Experimental Verification
暂无分享,去创建一个
Tao Peng | Wenbo Wang | Zhiwen Liu | PeiLiang Zuo | Tao Peng | Wenbo Wang | Peiliang Zuo | Zhiwen Liu
[1] Tony Q.S. Quek,et al. Dense Deployment of BLE-Based Body Area Networks: A Coexistence Study , 2018, IEEE Transactions on Green Communications and Networking.
[2] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[3] Xiaohu You,et al. Cellular communications on license-exempt spectrum , 2016, IEEE Communications Magazine.
[4] Xin Liu,et al. Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.
[5] Zhuo Lu,et al. Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications , 2014, IEEE Transactions on Mobile Computing.
[6] Jörg Widmer,et al. On the side effects of packet detection sensitivity in IEEE 802.11 interference management , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[7] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[8] Rong Zheng,et al. WiCop: Engineering WiFi Temporal White-Spaces for Safe Operations of Wireless Personal Area Networks in Medical Applications , 2011, IEEE Transactions on Mobile Computing.
[9] Srinivasan Seshan,et al. Understanding and mitigating the impact of RF interference on 802.11 networks , 2007, SIGCOMM 2007.
[10] Ilkka Harjula,et al. Performance of IEEE 802.11 based WLAN devices under various jamming signals , 2011, 2011 - MILCOM 2011 Military Communications Conference.