CURD: Controllable reactive jamming detection in underwater sensor networks
暂无分享,去创建一个
[1] Yih-Chun Hu,et al. Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks , 2007, IEEE/ACM Transactions on Networking.
[2] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[3] Jiejun Kong,et al. The challenges of building mobile underwater wireless networks for aquatic applications , 2006, IEEE Network.
[4] Huifang Chen,et al. A hybrid reservation-based MAC protocol for underwater acoustic sensor networks , 2013, Ad Hoc Networks.
[5] Hari Balakrishnan,et al. PPR: partial packet recovery for wireless networks , 2007, SIGCOMM '07.
[6] Srdjan Capkun,et al. Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .
[7] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[8] Sudip Misra,et al. Exploiting Partial-Packet Information for Reactive Jamming Detection: Studies in UWSN Environment , 2013, ICDCN.
[9] Srdjan Capkun,et al. Detection of Reactive Jamming in Sensor Networks , 2009 .
[10] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[11] Charalampos Konstantopoulos,et al. JAID: An algorithm for data fusion and jamming avoidance on distributed sensor networks , 2009, Pervasive Mob. Comput..
[12] Jun-Hong Cui,et al. R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks , 2007, International Conference on Wireless Algorithms, Systems and Applications (WASA 2007).
[13] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[14] Milica Stojanovic,et al. Underwater acoustic communication channels: Propagation models and statistical characterization , 2009, IEEE Communications Magazine.
[15] Winston K. G. Seah,et al. A Survey of Techniques and Challenges in Underwater Localization , 2011 .
[16] Haiyun Luo,et al. Datalink streaming in wireless sensor networks , 2006, SenSys '06.
[17] M. Stojanovic,et al. Statistical Characterization and Computationally Efficient Modeling of a Class of Underwater Acoustic Communication Channels , 2013, IEEE Journal of Oceanic Engineering.
[18] Donggang Liu,et al. Fast jamming detection in sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[19] Nam P. Nguyen,et al. A Trigger Identification Service for Defending Reactive Jammers in WSN , 2012, IEEE Transactions on Mobile Computing.
[20] Weihua Zhuang,et al. An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[21] Ivan Martinovic,et al. Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.
[22] Shengli Zhou,et al. Aqua-Sim: An NS-2 based simulator for underwater sensor networks , 2009, OCEANS 2009.
[23] Radha Poovendran,et al. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[24] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[25] D. Vere-Jones. Markov Chains , 1972, Nature.
[26] H. T. Mouftah,et al. A Survey of Architectures and Localization Techniques for Underwater Acoustic Sensor Networks , 2011, IEEE Communications Surveys & Tutorials.
[27] Wen-Hwa Liao,et al. SF-MAC: A Spatially Fair MAC Protocol for Underwater Acoustic Sensor Networks , 2012, IEEE Sensors Journal.
[28] Ranjit Singh,et al. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.
[29] Mari Carmen Domingo,et al. Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.
[30] M. Stojanovic,et al. Slotted FAMA: a MAC protocol for underwater acoustic networks , 2006, OCEANS 2006 - Asia Pacific.
[31] John S. Heidemann,et al. T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[32] Jens B. Schmitt,et al. Detection of reactive jamming in DSSS-based wireless networks , 2013, WiSec '13.
[33] B. John Oommen,et al. Stochastic learning-based weak estimation of multinomial random variables and its applications to pattern recognition in non-stationary environments , 2006, Pattern Recognit..
[35] Athanasios V. Vasilakos,et al. Jamming in underwater sensor networks: detection and mitigation , 2012, IET Commun..
[36] H. Vincent Poor,et al. Quickest Detection: Probabilistic framework , 2008 .
[37] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[38] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[39] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[40] Dario Pompili,et al. Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.
[41] Peng Xie,et al. VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks , 2006, Networking.