Performance of IEEE 802.11 under Jamming
暂无分享,去创建一个
Xin Liu | Guevara Noubir | Rajmohan Rajaraman | Bishal Thapa | Emrah Bayraktaroglu | Christopher King | Xin Liu | G. Noubir | R. Rajaraman | B. Thapa | E. Bayraktaroglu | Christopher King
[1] Ilenia Tinnirello,et al. Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[2] D. Curtis Schleher,et al. Electronic Warfare in the Information Age , 1999 .
[3] Dong Chao,et al. Universal Software Radio Peripheral , 2010 .
[4] Marimuthu Palaniswami,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.
[5] Mithun Acharya,et al. Intelligent Jamming in 802 . 11 b Wireless Networks , 2004 .
[6] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[7] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[8] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..
[9] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[10] J. J. Garcia-Luna-Aceves,et al. Delay analysis of IEEE 802.11 in single-hop networks , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[11] Dan Rubenstein,et al. Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[12] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[13] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[14] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[15] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[16] Haitao Wu,et al. IEEE 802.11 Distributed Coordination Function: Enhancement and analysis , 2008, Journal of Computer Science and Technology.
[17] Vaduvur Bharghavan,et al. A power controlled multiple access protocol for wireless packet networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[18] David J. Thuente,et al. Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .
[19] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[20] Joe F. Chicharo,et al. Hidden terminal jamming problems in IEEE 802.11 mobile ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[21] Tadeusz Wysocki,et al. On the Hidden Terminal Jamming Problem in IEEE 802 . 11 Mobile Ad Hoc Networks , 2001 .
[22] M. Hall,et al. Effect of pulse jamming on IEEE 802.11 wireless LAN performance , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[23] Xin Liu,et al. SPREAD: Foiling Smart Jammers Using Multi-Layer Agility , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.