메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1939-1947

On the performance of IEEE 802.11 under jamming

Author keywords

[No Author keywords available]

Indexed keywords

IEEE 802.11; SATURATION THROUGHPUT; THEORETICAL ANALYSIS;

EID: 51349091564     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2007.183     Document Type: Conference Paper
Times cited : (137)

References (26)
  • 1
    • 2342576134 scopus 로고    scopus 로고
    • Medium access control (mac) and physical specifications.
    • IEEE, January
    • IEEE, "Medium access control (mac) and physical specifications. " IEEE P802.11/D10, January 1999.
    • (1999) IEEE P802.11/D10
  • 2
    • 0033749075 scopus 로고    scopus 로고
    • Performance analysis of the ieee802.11 distributed coordination function
    • G. Bianchi, "Performance analysis of the ieee802.11 distributed coordination function," IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, 2000.
    • (2000) IEEE Journal on Selected Areas in Communications , vol.18 , Issue.3
    • Bianchi, G.1
  • 3
    • 51349144710 scopus 로고    scopus 로고
    • USRP
    • USRP. http://gnuradio.org/trac/wiki/USRP.
  • 5
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in MOBIHOC, 2005.
    • (2005) MOBIHOC
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 9
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y.-C. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in MOBICOM, 2002.
    • (2002) MOBICOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.3
  • 12
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions." in USENIX. 2003.
    • (2003) USENIX
    • Bellardo, J.1    Savage, S.2
  • 13
    • 0035007512 scopus 로고    scopus 로고
    • A power controlled multiple access protocol for wireless packet networks
    • V. B. J. Monks and W. Hwu, "A power controlled multiple access protocol for wireless packet networks." in INFOCOM, 2001.
    • (2001) INFOCOM
    • Monks, V.B.J.1    Hwu, W.2
  • 14
    • 24944442532 scopus 로고    scopus 로고
    • On the hidden terminal jamming problem in IEEE 802.11 mobile ad hoc networks
    • C. Ware, T. Wysocki, and J. Chicharo, "On the hidden terminal jamming problem in IEEE 802.11 mobile ad hoc networks." in ICC. 2001.
    • (2001) ICC
    • Ware, C.1    Wysocki, T.2    Chicharo, J.3
  • 15
    • 33847392537 scopus 로고    scopus 로고
    • Effect of pulse jamming on IEEE 802.11 wireless LAN performance
    • S.-G. H. Michael Hall, Aki Silvennoinen, "Effect of pulse jamming on IEEE 802.11 wireless LAN performance," in MILCOM, 2005.
    • (2005) MILCOM
    • Michael Hall, S.-G.H.1    Silvennoinen, A.2
  • 16
    • 34548311320 scopus 로고    scopus 로고
    • Intelligent jamming in wireless networks with applications to 802.11b and other networks
    • D. Thuente and M. Acharya, "Intelligent jamming in wireless networks with applications to 802.11b and other networks," in MILCOM, 2006.
    • (2006) MILCOM
    • Thuente, D.1    Acharya, M.2
  • 20
    • 84910117681 scopus 로고    scopus 로고
    • Delay analysis of ieee 802.11 in single-hop networks
    • M. M. Carvalho and J. J. Garcia-Luna-Aceves, "Delay analysis of ieee 802.11 in single-hop networks." in ICNP, 2003.
    • (2003) ICNP
    • Carvalho, M.M.1    Garcia-Luna-Aceves, J.J.2
  • 22
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks." IEEE Computer, vol. 35, no. 10, 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10
    • Wood, A.D.1    Stankovic, J.A.2
  • 23
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and network defense policies in wireless sensor networks
    • M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks." in INFOCOM, 2007.
    • (2007) INFOCOM
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 24
    • 33745949686 scopus 로고    scopus 로고
    • Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols
    • Y. W. Law, L. van Hoesel, J. Doumen, P. Hartel, and P. Havinga, "Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols." in SASN '05, 2005.
    • (2005) SASN '05
    • Law, Y.W.1    van Hoesel, L.2    Doumen, J.3    Hartel, P.4    Havinga, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.