Jamming sensor networks: attack and defense strategies
暂无分享,去创建一个
Wenyuan Xu | Wade Trappe | Ke Ma | Yanyong Zhang | W. Trappe | Yanyong Zhang | Ke Ma | Wenyuan Xu
[1] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[2] Wade Trappe,et al. Mobile network management and robust spatial retreats via network dynamics , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[3] Guevara Noubir,et al. Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.
[4] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[5] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[6] David E. Culler,et al. Versatile low power media access for wireless sensor networks , 2004, SenSys '04.
[7] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[8] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[9] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[10] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .