메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 217-225

Link-layer jamming attacks on S-MAC

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC CRIME COUNTERMEASURES; JAMMING; NETWORK PROTOCOLS; RADIO LINKS; SEMANTICS; SIGNAL DISTORTION; DENIAL-OF-SERVICE ATTACK; MEDIUM ACCESS CONTROL; SENSOR NETWORKS;

EID: 33745058163     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (63)

References (21)
  • 1
    • 33751522417 scopus 로고    scopus 로고
    • Radio jamming attacks against two popular mobile networks
    • H. Lipmaa and H. Pehu-Lehtonen, Eds. Helsinki University of Technology, Fall. [Online]
    • M. Ståhlberg, "Radio jamming attacks against two popular mobile networks," in Proceedings of the Helsinki University of Technology. Seminar on Network Security. Mobile Security, H. Lipmaa and H. Pehu-Lehtonen, Eds. Helsinki University of Technology, Fall 2000. [Online]. Available: http://www.tml.hut.fi/Opinnot/Tik-110.501/2000/papers/stahlberg.pdf
    • (2000) Proceedings of the Helsinki University of Technology. Seminar on Network Security. Mobile Security
    • Ståhlberg, M.1
  • 2
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct.
    • A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.2
  • 5
    • 0036343658 scopus 로고    scopus 로고
    • An energy-efficient MAC protocol for wireless sensor networks
    • USC/Information Sciences Institute. New York, NY, USA: IEEE, June. [Online]
    • W. Ye, J. Heidemann, and D. Estrin, "An Energy-Efficient MAC protocol for Wireless Sensor Networks," in Proc. IEEE Infocom, USC/Information Sciences Institute. New York, NY, USA: IEEE, June 2002, pp. 1567-1576. [Online]. Available: http://www.isi.edu/~johnh/PAPERS/Ye02a.html
    • (2002) Proc. IEEE Infocom , pp. 1567-1576
    • Ye, W.1    Heidemann, J.2    Estrin, D.3
  • 6
    • 4344714071 scopus 로고    scopus 로고
    • Medium access control with coordinated, adaptive sleeping for wireless sensor networks
    • [Online]
    • _, "Medium Access Control with Coordinated, Adaptive Sleeping for Wireless Sensor Networks," IEEE/ACM Transactions on Nethworking, vol. 12, no. 3, pp. 493-506, 2003. [Online]. Available: http://www.isi.edu/~weiye/pub/ smac_ton.pdf
    • (2003) IEEE/ACM Transactions on Nethworking , vol.12 , Issue.3 , pp. 493-506
  • 7
    • 20344392154 scopus 로고    scopus 로고
    • Benchmarking block ciphers for wireless sensor networks (extended abstract)
    • IEEE Computer Society Press, Oct. [Online]
    • Y. Law, J. Doumen, and P. Hartel, "Benchmarking block ciphers for wireless sensor networks (extended abstract)," in 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2004), IEEE Computer Society Press, Oct. 2004. [Online]. Available: http://wwwhome.cs.utwente.nl/ ~ywlaw/pub/law04benchmarking.pdf
    • (2004) 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2004)
    • Law, Y.1    Doumen, J.2    Hartel, P.3
  • 10
    • 0042014530 scopus 로고    scopus 로고
    • Random waypoint considered harmful
    • Apr.
    • J. Yoon, M. Liu, and B. Noble, "Random waypoint considered harmful," in Proc. IEEE INFOCOM, vol. 2, Apr. 2003, pp. 1312-1321.
    • (2003) Proc. IEEE INFOCOM , vol.2 , pp. 1312-1321
    • Yoon, J.1    Liu, M.2    Noble, B.3
  • 12
    • 33745957963 scopus 로고    scopus 로고
    • Datasheet. [Online]
    • RF Monolithics, Inc., "TR1001: 868.35 MHz Hybrid Transceiver," Datasheet, 2002. [Online]. Available: http://www.rfm.com/products/data/tr1001. pdf
    • (2002) TR1001: 868.35 MHz Hybrid Transceiver
  • 16
    • 33746822588 scopus 로고    scopus 로고
    • Low power DOS attacks in data wireless LANs and countermeasures
    • [Online]
    • G. Lin and G: Noubir, "Low Power DOS Attacks in Data Wireless LANs and Countermeasures," Northeastern University, Tech. Rep., 2002. [Online], Available: http://www.ccs.neu.edu/home/noubir/publications/LN02a.pdf
    • (2002) Northeastern University, Tech. Rep.
    • Lin, G.1    Noubir, G.2
  • 17
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • ser. LNCS. Springer-Verlag. [Online]
    • F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," in Proceedings of The 7th International Workshop on Security Protocols, ser. LNCS, vol. 1796. Springer-Verlag, 2000, pp. 172-194. [Online]. Available: http://www.c1.cam.ac. uk/~fms27/papers/ duckling.pdf
    • (2000) Proceedings of the 7th International Workshop on Security Protocols , vol.1796 , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 18
    • 33645628961 scopus 로고    scopus 로고
    • Jamming analysis of MAC protocols
    • [Online]
    • R. Negi and A. Perrig, "Jamming analysis of MAC protocols," Carnegie Mellon Technical Memo, 2003. [Online]. Available: http://www.ece.cmu. edu/~negi/publications/preprints/csmajam.ps
    • (2003) Carnegie Mellon Technical Memo
    • Negi, R.1    Perrig, A.2
  • 20
    • 1542360013 scopus 로고    scopus 로고
    • Detection and handling of MAC layer misbehavior in wireless networks
    • IEEE Computer Society Press
    • P. Kyasanur and N. Vaidya, "Detection and Handling of MAC Layer Misbehavior in Wireless Networks," in Int. Conf. on Dependable Systems and Networks (DSN'03). IEEE Computer Society Press, 2003, pp. 173-182.
    • (2003) Int. Conf. on Dependable Systems and Networks (DSN'03) , pp. 173-182
    • Kyasanur, P.1    Vaidya, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.