메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1307-1315

Optimal jamming attacks and network defense policies in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); HEURISTIC METHODS; JAMMING; OPTIMIZATION; PROBLEM SOLVING; TELECOMMUNICATION LINKS;

EID: 34548314598     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2007.155     Document Type: Conference Paper
Times cited : (226)

References (17)
  • 1
    • 85008044268 scopus 로고    scopus 로고
    • Selfish MAC layer misbehavior in wireless networks
    • Sept./Oct
    • P. Kyasanur and N. Vaidya, "Selfish MAC layer misbehavior in wireless networks," IEEE Trans. Mobile Computing, vol. 4, no. 5, Sept./Oct. 2005.
    • (2005) IEEE Trans. Mobile Computing , vol.4 , Issue.5
    • Kyasanur, P.1    Vaidya, N.2
  • 4
    • 0034250315 scopus 로고    scopus 로고
    • Analysis of an on-off jamming situation as a dynamic game
    • Aug
    • R. Mallik, R. Scholtz, and G. Papavassilopoulos, "Analysis of an on-off jamming situation as a dynamic game," IEEE Trans. Commun., vol. 48, no. 8, pp. 1360-1373, Aug. 2000.
    • (2000) IEEE Trans. Commun , vol.48 , Issue.8 , pp. 1360-1373
    • Mallik, R.1    Scholtz, R.2    Papavassilopoulos, G.3
  • 6
    • 33746342121 scopus 로고    scopus 로고
    • Quarantine region scheme to mitigate spam attacks in wireless-sensor networks
    • August
    • V. Coskun, E. Cayirci, A. Levi, and S. Sancak, "Quarantine region scheme to mitigate spam attacks in wireless-sensor networks", IEEE Trans. on Mobile Computing, vol. 5, no. 8, pp. 1074-1086, August 2006.
    • (2006) IEEE Trans. on Mobile Computing , vol.5 , Issue.8 , pp. 1074-1086
    • Coskun, V.1    Cayirci, E.2    Levi, A.3    Sancak, S.4
  • 7
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, no. 10, pp. 54-62, 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 10
    • 33845635202 scopus 로고    scopus 로고
    • Wormhole-based anti-jamming techniques in sensor networks
    • Jan
    • M. Cagalj, S. Capkun, J.-P. Hubaux, "Wormhole-based anti-jamming techniques in sensor networks," IEEE Trans. on Mobile Computing, vol. 6, no. 1, pp. 100-114, Jan. 2007.
    • (2007) IEEE Trans. on Mobile Computing , vol.6 , Issue.1 , pp. 100-114
    • Cagalj, M.1    Capkun, S.2    Hubaux, J.-P.3
  • 11
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • W. Xu, W. Trappe, Y. Zhang and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," Proc. ACM MobiHoc, 2005.
    • (2005) Proc. ACM MobiHoc
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 15
    • 0033349954 scopus 로고    scopus 로고
    • Multihypothesis Sequential Probability Ratio Tests - Part I: Asymptotic optimality
    • Nov
    • Vladimir P. Dragalin, A. G. Tartakovsky and V. V. Veeravalli. "Multihypothesis Sequential Probability Ratio Tests - Part I: Asymptotic optimality," IEEE Trans. Inf. Theory, Vol. 45, No. 7, Nov. 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.7
    • Dragalin, V.P.1    Tartakovsky, A.G.2    Veeravalli, V.V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.