On Assessing the Impact of Jamming Strategies on the Behavior of DYMO-Based MANETs
暂无分享,去创建一个
[1] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[2] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[3] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[4] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[5] P. Peebles. Probability, Random Variables and Random Signal Principles , 1993 .
[6] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[7] Prashant Krishnamurthy,et al. On limited-range strategic/random jamming attacks in wireless ad hoc networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.
[8] Mingyan Liu,et al. Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[9] B. Yu. Lemeshko,et al. Comparative analysis of the power of goodness-of-fit tests for near competing hypotheses. II. Verification of complex hypotheses , 2009 .
[10] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[11] Michael McGuire,et al. Stationary distributions of random walk mobility models for wireless ad hoc networks , 2005, MobiHoc '05.
[12] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[13] B. Yu. Lemeshko,et al. Comparative analysis of the power of goodness-of-fit tests for near competing hypotheses. I. The verification of simple hypotheses , 2009 .
[14] Rajendra V. Boppana,et al. Mitigating malicious control packet floods in ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[15] Deepali Arora,et al. STARS: A Framework for Statistically Rigorous Simulation-Based Network Research , 2011, 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.
[16] Lijun Qian,et al. Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[17] Geethapriya Thamilarasu,et al. A Cross-layer Approach to Detect Jamming Attacks in Wireless Ad hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[18] Jalel Ben-Othman,et al. Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.