A hybrid DS-FH-THSS approach anti-jamming in Wireless Sensor Networks
暂无分享,去创建一个
[1] Yu Hua,et al. Improving the Security of Time Synchronization in WSN , 2008, 2008 IEEE/ASME International Conference on Mechtronic and Embedded Systems and Applications.
[2] Lin Guan,et al. DCCC6: Duty Cycle-aware congestion control for 6LoWPAN networks , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[3] Lawrence Harold Hardy,et al. A History of Computer Networking Technology , 2009 .
[4] Anfeng Liu,et al. Energy-Hole Avoidance Routing Algorithm for WSN , 2008, 2008 Fourth International Conference on Natural Computation.
[5] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[6] Margherita Pagani,et al. Encyclopedia of Multimedia Technology and Networking (second edition) , 2009 .
[7] Yuhua Zhao. THE STUDY OF MULTIPLE ACCESS TECHNIQUES IN ULTRA WIDEBAND IMPULSE RADIO COMMUNICATIONS , 2005 .
[8] Lina E. Alatabani,et al. FHSS, DSSS, And Hybrid DS/FH Performance Evaluation For VSAT , 2015 .
[9] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[10] Chao Yang,et al. An Automated Black-box Testing Approach for WSN Security Protocols , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[11] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[12] Amit Kumar Mishra,et al. ANALYSIS OF DENIAL OF SERVICE (DOS) ATTACKS IN WIRELESS SENSOR NETWORKS , 2014 .
[13] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[14] Shakil Akhtar. Evolution of Technologies, Standards, and Deployment of 2G-5G Networks , 2009 .
[15] Hai Jin,et al. From Principle to Practice , 2010 .
[16] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[17] Χαράλαμπος Κωνσταντόπουλος,et al. Defending wireless sensor networks from jamming attacks , 2015 .
[18] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[19] Wenxiang Zhang,et al. Research of WSN routing algorithm based on the ant algorithm , 2009, 2009 9th International Conference on Electronic Measurement & Instruments.
[20] Carlos E. Palau,et al. I3WSN: Industrial Intelligent Wireless Sensor Networks for indoor environments , 2014, Comput. Ind..
[21] Ryuji Kohno,et al. Low Complexity Chirp Pulsed Ultra-Wideband System with Near-Optimum Multipath Performance , 2011, IEEE Transactions on Wireless Communications.