A Trigger Identification Service for Defending Reactive Jammers in WSN
暂无分享,去创建一个
Nam P. Nguyen | Ying Xuan | My T. Thai | Yilin Shen | M. Thai | Yilin Shen | Ying Xuan
[1] Srdjan Capkun,et al. Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .
[2] David S. Johnson,et al. The Rectilinear Steiner Tree Problem is NP Complete , 1977, SIAM Journal of Applied Mathematics.
[3] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[4] Othman Sidek,et al. Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment , 2008 .
[5] Srikanth V. Krishnamurthy,et al. Lightweight Jammer Localization in Wireless Networks: System Design and Implementation , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[6] Leslie G. Valiant,et al. Universality considerations in VLSI circuits , 1981, IEEE Transactions on Computers.
[7] Srdjan Capkun,et al. Detection of reactive jamming in sensor networks , 2010, TOSN.
[8] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[9] Wenyuan Xu,et al. Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges , 2010, DCOSS.
[10] Wang Zanji,et al. Performance of DSSS against Repeater Jamming , 2006, 2006 13th IEEE International Conference on Electronics, Circuits and Systems.
[11] Wenyuan Xu,et al. Localizing jammers in wireless networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[12] Jingbo Guo,et al. Feasibility Assessment of Repeater Jamming Technique for DSSS , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[13] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[14] Taieb Znati,et al. A Novel Approach Against Reactive Jamming Attacks , 2011, Ad Hoc Sens. Wirel. Networks.
[15] Radha Poovendran,et al. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection , 2011, IEEE/ACM Transactions on Networking.
[16] Murat Çakiroglu,et al. Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.
[17] Taieb Znati,et al. Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes , 2009, FOWANC '09.
[18] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[19] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[20] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[21] Jean Walrand,et al. Maximal Cliques in Unit Disk Graphs: Polynomial Approximation , 2006 .
[22] C. Pandu Rangan,et al. Algorithmic aspects of clique-transversal and clique-independent sets , 2000, Discret. Appl. Math..
[23] Haim Kaplan,et al. Optimal Cover of Points by Disks in a Simple Polygon , 2010, SIAM J. Comput..
[24] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[25] Ding-Zhu Du,et al. New Constructions of One- and Two-Stage Pooling Designs , 2008, J. Comput. Biol..
[26] Mikhail J. Atallah,et al. Indexing Information for Data Forensics , 2005, ACNS.