Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes
暂无分享,去创建一个
[1] Othman Sidek,et al. Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment , 2008 .
[2] Wang Zanji,et al. Performance of DSSS against Repeater Jamming , 2006, 2006 13th IEEE International Conference on Electronics, Circuits and Systems.
[3] Jingbo Guo,et al. Feasibility Assessment of Repeater Jamming Technique for DSSS , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[4] Yih-Chun Hu,et al. Dynamic Jamming Mitigation for Wireless Broadcast Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[5] Josef Pieprzyk,et al. Broadcast anti-jamming systems , 1999, IEEE International Conference on Networks. ICON '99 Proceedings (Cat. No.PR00243).
[6] Wenyuan Xu,et al. Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[7] Jean C. Walrand,et al. Approximating maximal cliques in ad-hoc networks , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).
[8] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[9] Guevara Noubir,et al. Linear programming models for jamming attacks on network traffic flows , 2008, WiOpt 2008.
[10] D. Du,et al. Combinatorial Group Testing and Its Applications , 1993 .
[11] Don J. Torrieri,et al. Fundamental limitations on repeater jamming of frequency-hopping communications , 1989, IEEE J. Sel. Areas Commun..
[12] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[13] Panos M. Pardalos,et al. The maximum clique problem , 1994, J. Glob. Optim..
[14] John E. Hershey,et al. On a follower tone-jammer countermeasure technique , 1995, IEEE Trans. Commun..
[15] Ding-Zhu Du,et al. On Construction of Virtual Backbone in Wireless Ad Hoc Networks with Unidirectional Links , 2008, IEEE Transactions on Mobile Computing.
[16] C. Bron,et al. Algorithm 457: finding all cliques of an undirected graph , 1973 .
[17] E. B. Felstead. Follower jammer considerations for frequency hopped spread spectrum , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).
[18] Guevara Noubir,et al. Linear programming models for jamming attacks on network traffic flows , 2008, 2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops.
[19] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[20] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[21] Coenraad Bron,et al. Finding all cliques of an undirected graph , 1973 .