Link-layer jamming attacks on S-MAC
暂无分享,去创建一个
Jerry den Hartog | Yee Wei Law | Pieter H. Hartel | Paul J. M. Havinga | P. Hartel | P. Havinga | J. D. Hartog
[1] Rohit Negi,et al. DoS analysis of reservation based MAC protocols , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[2] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[3] Deborah Estrin,et al. An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[4] Margaret Martonosi,et al. Hardware design experiences in ZebraNet , 2004, SenSys '04.
[5] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[6] Jennifer C. Hou,et al. On deriving the upper bound of α-lifetime for large sensor networks , 2004, MobiHoc '04.
[7] Mika Ståhlberg. Radio Jamming Attacks Against Two Popular Mobile Networks , 2000 .
[8] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[9] Guevara Noubir,et al. Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.
[10] Koen Langendoen,et al. Link layer measurements in sensor networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).
[11] P.J.M. Havinga,et al. AI-LMAC: an adaptive, information-centric and lightweight MAC protocol for wireless sensor networks , 2004, Proceedings of the 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004..
[12] Yee Wei Law,et al. Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract) , 2004 .
[13] Saurabh Ganeriwal,et al. On Cheating in CSMA/CA Ad Hoc Networks , 2004 .
[14] Deborah Estrin,et al. Directed diffusion for wireless sensor networking , 2003, TNET.
[15] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[16] Jerzy Konorski,et al. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations , 2002, NETWORKING.
[17] Mingyan Liu,et al. Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[18] Deborah Estrin,et al. Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.