메뉴 건너뛰기




Volumn , Issue , 2007, Pages 346-349

Cross-layer jamming detection and mitigation in wireless broadcast networks

Author keywords

Performance; Security

Indexed keywords

BROADCAST NETWORKS; JAMMING ATTACKS; NOISE INJECTION; SPECTRUM COMMUNICATIONS SYSTEM;

EID: 37749010823     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1287853.1287901     Document Type: Conference Paper
Times cited : (50)

References (14)
  • 1
    • 33748061660 scopus 로고    scopus 로고
    • Jamming and sensing of encrypted wireless ad hoc networks
    • Technical Report CU-CS-1005-06, University of Colorado at Boulder
    • Timothy X Brown, Jesse James, and Amita Sethi. Jamming and sensing of encrypted wireless ad hoc networks. Technical Report CU-CS-1005-06, University of Colorado at Boulder, 2006.
    • (2006)
    • Brown, T.X.1    James, J.2    Sethi, A.3
  • 2
    • 0018443381 scopus 로고
    • Privacy and authentication: An introduction to cryptography
    • March
    • Whitfield Difiie and Martin E. Hellman. Privacy and authentication: An introduction to cryptography. Proceedings of the IEEE, 67(3):397-427, March 1979.
    • (1979) Proceedings of the IEEE , vol.67 , Issue.3 , pp. 397-427
    • Difiie, W.1    Hellman, M.E.2
  • 5
    • 0347023984 scopus 로고    scopus 로고
    • Evolution of wireless data services: IS-95 to CDMA2000
    • 140-149, October
    • D. N. Knisely, S. Kumar, S. Laha, and S. Nanda. Evolution of wireless data services: IS-95 to CDMA2000. IEEE Communications Magazine, 36(10):140-149, October 1998.
    • (1998) IEEE Communications Magazine , vol.36 , Issue.10
    • Knisely, D.N.1    Kumar, S.2    Laha, S.3    Nanda, S.4
  • 6
    • 35048826237 scopus 로고    scopus 로고
    • An asymmetric security mechanism for navigation signals
    • May
    • Markus G. Kuhn. An asymmetric security mechanism for navigation signals. In Proceedings of the 6th Information Hiding Workshop, volume 3200, pages 239-252, May 2004.
    • (2004) Proceedings of the 6th Information Hiding Workshop , vol.3200 , pp. 239-252
    • Kuhn, M.G.1
  • 7
    • 64149093709 scopus 로고
    • Overview of the technical basis of Qualcomm's CDMA cellular telephone system design: A view of North American TIA/EIA IS-95
    • November
    • J. S. Lee. Overview of the technical basis of Qualcomm's CDMA cellular telephone system design: a view of North American TIA/EIA IS-95. In Proc ICCS '94, volume 2, pages 353-358, November 1994.
    • (1994) Proc ICCS '94 , vol.2 , pp. 353-358
    • Lee, J.S.1
  • 9
    • 0017959977 scopus 로고
    • Secure communication over insecure channels
    • R. Merkle. Secure communication over insecure channels. Communications of the ACM, 21(4):294-299, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.1
  • 11
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 12
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • May
    • Alan T. Sherman and David A. McGrew. Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering, 29(5):444-458, May 2003.
    • (2003) IEEE Transactions on Software Engineering , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2
  • 13
    • 37749013945 scopus 로고    scopus 로고
    • A. J. Viterbi. CDMA Principles of Spread Spectrum Communication. Addison-Wesley, 1995.
    • A. J. Viterbi. CDMA Principles of Spread Spectrum Communication. Addison-Wesley, 1995.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.