SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers
暂无分享,去创建一个
[1] Yih-Chun Hu,et al. Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming , 2013, MobiWac '13.
[2] Devavrat Shah,et al. Spinal codes , 2012, CCRV.
[3] Koorosh Firouzbakht,et al. On the capacity of rate-adaptive packetized wireless communication links under jamming , 2012, WISEC '12.
[4] Christian Scheideler,et al. A jamming-resistant MAC protocol for single-hop wireless networks , 2008, PODC '08.
[5] Ian D. Marsland,et al. A Comparison of Rateless Codes at Short Block Lengths , 2008, 2008 IEEE International Conference on Communications.
[6] Yih-Chun Hu,et al. Dynamic Jamming Mitigation for Wireless Broadcast Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[7] Robert Simon,et al. A multi-channel defense against jamming attacks in wireless sensor networks , 2007, Q2SWinet '07.
[8] John S. Baras,et al. Performance Comparison of Detection Schemes for MAC Layer Misbehavior , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[9] Wenyuan Xu,et al. Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[10] Abhay Parekh,et al. Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.
[11] Ashutosh Sabharwal,et al. Design of WARP: A wireless open-access research platform , 2006, 2006 14th European Signal Processing Conference.
[12] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[13] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[14] S. T. Chung,et al. A game-theoretic approach to power allocation in frequency-selective gaussian interference channels , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[15] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[16] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[17] A. M. Murray. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications , 1999 .
[18] Vijay K. Bhargava,et al. Unified error analysis of DQPSK in fading channels , 1994 .
[19] Marvin K. Simon,et al. Spread Spectrum Communications Handbook , 1994 .
[20] T. Tjhung,et al. BER performance of DQPSK in slow Rician fading , 1992 .
[21] L. M. Jones. Organization of physics education at a Large American State University (The University of Illinois at Urbana-Champaign(UIUC)) , 1989 .
[22] Tamer Basar,et al. With the Capacity 0.461(bits) and the Optimal Opd Being 'q = , 1998 .
[23] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[24] Lawrence G. Roberts,et al. ALOHA packet system with and without slots and capture , 1975, CCRV.