Jamming-resistant Broadcast Communication without Shared Keys
暂无分享,去创建一个
[1] Srdjan Capkun,et al. SecNav: secure broadcast localization and time synchronization in wireless networks , 2007, MobiCom '07.
[2] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[3] Dong Chao,et al. Universal Software Radio Peripheral , 2010 .
[4] Tjeng Thiang Tjhung,et al. Multitone jamming of FH/BFSK in Rician channels , 1999, IEEE Trans. Commun..
[5] Y. Zhan,et al. Spread-spectrum sequence estimation for DSSS signal in non-cooperative communication systems , 2005 .
[6] David L Adamy,et al. Ew 101: A First Course in Electronic Warfare , 2001 .
[7] Alan Bensky,et al. Wireless positioning technologies and applications , 2008 .
[8] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[9] Balasubramaniam Natarajan,et al. An evolutionary approach to designing complex spreading codes for DS-CDMA , 2005, IEEE Transactions on Wireless Communications.
[10] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[11] Josef Pieprzyk,et al. Broadcast anti-jamming systems , 2001, Comput. Networks.
[12] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[13] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[14] Robin Dillard. Detectability of Spread-Spectrum Signals , 1979, IEEE Transactions on Aerospace and Electronic Systems.
[15] Guevara Noubir,et al. On link layer denial of service in data wireless LANs: Research Articles , 2005 .
[16] Fan Chung Graham,et al. Optical orthogonal codes: Design, analysis, and applications , 1989, IEEE Trans. Inf. Theory.
[17] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..
[18] L.C. Baird,et al. Keyless Jam Resistance , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.
[19] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[20] Bradford W. Parkinson,et al. Global Positioning System , 1995 .
[21] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[22] Wang Zanji,et al. Performance of DSSS against Repeater Jamming , 2006, 2006 13th IEEE International Conference on Electronics, Circuits and Systems.
[23] Yih-Chun Hu,et al. Dynamic Jamming Mitigation for Wireless Broadcast Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[24] M.B. Pursley,et al. Crosscorrelation properties of pseudorandom and related sequences , 1980, Proceedings of the IEEE.
[25] Markus G. Kuhn,et al. An Asymmetric Security Mechanism for Navigation Signals , 2004, Information Hiding.