Jamming and anti-jamming techniques in wireless networks: a survey
暂无分享,去创建一个
[1] Guevara Noubir,et al. Linear programming models for jamming attacks on network traffic flows , 2008, WiOpt 2008.
[2] Rami G. Melhem,et al. Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive? , 2008, SecureComm.
[3] Emile H. L. Aarts,et al. Simulated Annealing: Theory and Applications , 1987, Mathematics and Its Applications.
[4] Wenyuan Xu,et al. Extracting jamming signals to locate radio interferers and jammers , 2012, MobiHoc '12.
[5] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[6] Xin Liu,et al. Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.
[7] David Williams,et al. Probability with Martingales , 1991, Cambridge mathematical textbooks.
[8] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[9] Peng Ning,et al. Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping , 2012, IEEE Transactions on Information Forensics and Security.
[10] Dan Rubenstein,et al. Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[11] Rami G. Melhem,et al. Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks , 2008, MobiQuitous.
[12] Jitendra K. Tugnait,et al. Spectrally Efficient Jamming Mitigation Based on Code-Controlled Frequency Hopping , 2011, IEEE Transactions on Wireless Communications.
[13] Yih-Chun Hu,et al. Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks , 2007, IEEE/ACM Transactions on Networking.
[14] Sencun Zhu,et al. An Algorithm for Jammer Localization in Wireless Sensor Networks , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.
[15] Peng Ning,et al. Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.
[16] Taieb Znati,et al. Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes , 2009, FOWANC '09.
[17] Eylem Ekici,et al. Adaptive Channel Hopping for Interference Robust Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Communications.
[18] Ranjit Singh,et al. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.
[19] Prashant Krishnamurthy,et al. On limited-range strategic/random jamming attacks in wireless ad hoc networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.
[20] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[21] Srikanth V. Krishnamurthy,et al. On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks , 2010, IEEE Transactions on Wireless Communications.
[22] Guevara Noubir,et al. Linear programming models for jamming attacks on network traffic flows , 2008, 2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops.
[23] Hong Huang,et al. Jamming Dust: A Low-Power Distributed Jammer Network , 2010 .
[24] Jalel Ben-Othman,et al. Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.
[25] Zhuo Lu,et al. From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic , 2011, 2011 Proceedings IEEE INFOCOM.
[26] Charalampos Konstantopoulos,et al. Defending Wireless Sensor Networks from Jamming Attacks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.
[27] Gang Zhou,et al. DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[28] Marimuthu Palaniswami,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.
[29] Kumkum Garg,et al. A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks , 2009, 2009 First International Conference on Computational Intelligence, Communication Systems and Networks.
[30] F. Golatowski,et al. Weighted Centroid Localization in Zigbee-based Sensor Networks , 2007, 2007 IEEE International Symposium on Intelligent Signal Processing.
[31] Geethapriya Thamilarasu,et al. Game Theoretic Modeling of Jamming Attacks in Ad hoc Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[32] Srikanth V. Krishnamurthy,et al. Gaming the jammer: Is frequency hopping effective? , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.
[33] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[34] Christian Scheideler,et al. A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks , 2010, DISC.
[35] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[36] Srdjan Capkun,et al. Detection of Reactive Jamming in Sensor Networks , 2009 .
[37] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[38] Wenyuan Xu,et al. Localizing jammers in wireless networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[39] Wenyuan Xu,et al. Determining the position of a jammer using a virtual-force iterative approach , 2011, Wirel. Networks.
[40] Robert Simon,et al. MULEPRO: a multi-channel response to jamming attacks in wireless sensor networks , 2010, Wirel. Commun. Mob. Comput..
[41] Srinivasan Seshan,et al. Understanding and mitigating the impact of RF interference on 802.11 networks , 2007, SIGCOMM 2007.
[42] Lisa Ann Osadciw,et al. Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.
[43] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[44] Panos M. Pardalos,et al. Jamming communication networks under complete uncertainty , 2008, Optim. Lett..
[45] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[46] Leandros Tassiulas,et al. FIJI: Fighting Implicit Jamming in 802.11 WLANs , 2009, SecureComm.
[47] Deborah Estrin,et al. GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..
[48] Sisi Liu,et al. Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.
[49] Dina Katabi,et al. iJam: Jamming Oneself for Secure Wireless Communication , 2010 .
[50] Xiaodong Wang,et al. Jammer Localization in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[51] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[52] Srikanth V. Krishnamurthy,et al. Lightweight Jammer Localization in Wireless Networks: System Design and Implementation , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[53] Alon Efrat,et al. Optimization Schemes for Protective Jamming , 2012, MobiHoc '12.
[54] P. Consul,et al. A Generalization of the Poisson Distribution , 1973 .
[55] Steven D. Glaser,et al. Feasibility analysis of controller design for adaptive channel hopping , 2009, VALUETOOLS.
[56] Ivan Martinovic,et al. Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.
[57] Emel Kizilkaya Aydogan,et al. A decision support system for locating VHF/UHF radio jammer systems on the terrain , 2008, Inf. Syst. Frontiers.
[58] Wenyuan Xu,et al. Exploiting Jamming-Caused Neighbor Changes for Jammer Localization , 2012, IEEE Transactions on Parallel and Distributed Systems.
[59] Christian Scheideler,et al. A jamming-resistant MAC protocol for single-hop wireless networks , 2008, PODC '08.
[60] Robert Simon,et al. A multi-channel defense against jamming attacks in wireless sensor networks , 2007, Q2SWinet '07.