메뉴 건너뛰기




Volumn , Issue , 2008, Pages 45-54

A jamming-resistant MAC protocol for single-hop wireless networks

Author keywords

Jamming; MAC protocols; Wireless ad hoc networks

Indexed keywords

AD HOC NETWORKS; ADAPTIVE CONTROL SYSTEMS; DISTRIBUTED COMPUTER SYSTEMS; ENERGY EFFICIENCY; JAMMING; MEDIUM ACCESS CONTROL;

EID: 57549097287     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1400751.1400759     Document Type: Conference Paper
Times cited : (130)

References (29)
  • 1
    • 42149164305 scopus 로고    scopus 로고
    • A multi-channel defense against jamming attacks in wireless sensor networks
    • G. Alnifie and R. Simon. A multi-channel defense against jamming attacks in wireless sensor networks. In Proc. of Q2SWinet'07, pages 95-104, 2007.
    • (2007) Proc. of Q2SWinet'07 , pp. 95-104
    • Alnifie, G.1    Simon, R.2
  • 4
    • 33748061660 scopus 로고    scopus 로고
    • Jamming and sensing of encrypted wireless ad hoc networks
    • T. Brown, J. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proc. of MobiHoc'06, pages 120-130, 2006.
    • (2006) Proc. of MobiHoc'06 , pp. 120-130
    • Brown, T.1    James, J.2    Sethi, A.3
  • 5
    • 37749010823 scopus 로고    scopus 로고
    • Cross-layer jamming detection and mitigation in wireless broadcast networks
    • J. T. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proc. of MobiCom'07, pages 346-349, 2007.
    • (2007) Proc. of MobiCom'07 , pp. 346-349
    • Chiang, J.T.1    Hu, Y.-C.2
  • 6
    • 33748697400 scopus 로고    scopus 로고
    • Adversarial queuing on the multiple-access channel
    • Bogdan S. Chlebus, Dariusz R. Kowalski, and Mariusz A. Rokicki. Adversarial queuing on the multiple-access channel. In Proc. of PODC'06, pages 92-101, 2006.
    • (2006) Proc. of PODC'06 , pp. 92-101
    • Chlebus, B.S.1    Kowalski, D.R.2    Rokicki, M.A.3
  • 7
    • 33745192089 scopus 로고    scopus 로고
    • Broadcasting algorithms in radio networks with unknown topology
    • A. Czumaj and W. Rytter. Broadcasting algorithms in radio networks with unknown topology. Journal of Algorithms, 60(2): 115-143, 2006.
    • (2006) Journal of Algorithms , vol.60 , Issue.2 , pp. 115-143
    • Czumaj, A.1    Rytter, W.2
  • 8
    • 57549107865 scopus 로고    scopus 로고
    • S. Gilbert, R. Guerraoui, and C. Newport. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In Proc. of OPODIS'06, 2006.
    • S. Gilbert, R. Guerraoui, and C. Newport. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In Proc. of OPODIS'06, 2006.
  • 10
    • 0001153669 scopus 로고    scopus 로고
    • Analysis of backoff protocols for mulitiple accesschannels
    • Johan Hastad, Tom Leighton, and Brian Rogoff. Analysis of backoff protocols for mulitiple accesschannels. SIAM Journal on Computing, 25(4):740-774, 1996.
    • (1996) SIAM Journal on Computing , vol.25 , Issue.4 , pp. 740-774
    • Hastad, J.1    Leighton, T.2    Rogoff, B.3
  • 11
    • 57549097071 scopus 로고    scopus 로고
    • Medium access control (MAC) and physical specifications
    • IEEE
    • IEEE. Medium access control (MAC) and physical specifications. In 1EEE P802. II/D10, 1999.
    • (1999) 1EEE P802. II/D10
  • 12
    • 57549088316 scopus 로고    scopus 로고
    • Reliable broadcast in radio networks: The bounded collision case
    • C. Y. Koo, V. Bhandari, J. Katz, and N. H. Vaidya. Reliable broadcast in radio networks: The bounded collision case. In Proc. of PODC'06, 2006.
    • (2006) Proc. of PODC'06
    • Koo, C.Y.1    Bhandari, V.2    Katz, J.3    Vaidya, N.H.4
  • 16
    • 33745949686 scopus 로고    scopus 로고
    • Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols
    • Y. W. Law, L. van Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In Proc. of'SASN'05, pages 76-88, 2005.
    • (2005) Proc. of'SASN'05 , pp. 76-88
    • Law, Y.W.1    van Hoesel, L.2    Doumen, J.3    Hartel, P.4    Havinga, P.5
  • 17
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and network defense policies in wireless sensor networks
    • M. Li, I. Koutsopoulos, and R. Poovendran. Optimal jamming attacks and network defense policies in wireless sensor networks. In Proc. of Infocom'07, pages 1307-1315. 2007.
    • (2007) Proc. of Infocom'07 , pp. 1307-1315
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 18
    • 34548295754 scopus 로고    scopus 로고
    • Spread: Foiling smart jammers using multi-layer agility
    • Xin Liu, Guevara Noubir, Ravi Sundaram, and San Tan. Spread: Foiling smart jammers using multi-layer agility. In Proc. of Infocom'07, pages 2536-2540, 2007.
    • (2007) Proc. of Infocom'07 , pp. 2536-2540
    • Liu, X.1    Noubir, G.2    Sundaram, R.3    Tan, S.4
  • 19
    • 34548307187 scopus 로고    scopus 로고
    • Using channel hopping to increase 802.11 resilience to jamming attacks
    • Vishnu Navda, Aniruddha Bohra, Samrat Ganguly, and Dan Rubenstein. Using channel hopping to increase 802.11 resilience to jamming attacks. In Proc. of Infocom'07, pages 2526-2530, 2007.
    • (2007) Proc. of Infocom'07 , pp. 2526-2530
    • Navda, V.1    Bohra, A.2    Ganguly, S.3    Rubenstein, D.4
  • 20
    • 33645628961 scopus 로고    scopus 로고
    • Jamming analysis of MAC protocols
    • Technical report, Carnegie Mellon University
    • R. Negi and A. Perrig. Jamming analysis of MAC protocols. Technical report, Carnegie Mellon University, 2003.
    • (2003)
    • Negi, R.1    Perrig, A.2
  • 21
    • 57549114031 scopus 로고    scopus 로고
    • Feasibility and complexity of broadcasting with random transmission failures
    • A. Pelc and D. Peleg. Feasibility and complexity of broadcasting with random transmission failures. In Proc. of PODC'05, 2005.
    • (2005) Proc. of PODC'05
    • Pelc, A.1    Peleg, D.2
  • 22
    • 0032107964 scopus 로고    scopus 로고
    • Stochastic contention resolution with short delays
    • Prabhakar Raghavan and Eli Upfal. Stochastic contention resolution with short delays. SIAM Journal on Computing, 28(2):709-719, 1999.
    • (1999) SIAM Journal on Computing , vol.28 , Issue.2 , pp. 709-719
    • Raghavan, P.1    Upfal, E.2
  • 23
    • 0001595705 scopus 로고
    • Chernoff-Hoeffding bounds for applications with limited independence
    • J. Schmidt, A. Siegel, and A. Srinivasan. Chernoff-Hoeffding bounds for applications with limited independence. SIAM Journal on Discrete Mathematics, 8(2):223-250, 1995.
    • (1995) SIAM Journal on Discrete Mathematics , vol.8 , Issue.2 , pp. 223-250
    • Schmidt, J.1    Siegel, A.2    Srinivasan, A.3
  • 25
    • 34548311320 scopus 로고    scopus 로고
    • Intelligent jamming in wireless networks with applications to 802.11 b and other networks
    • David Thuente and Mithun Acharya. Intelligent jamming in wireless networks with applications to 802.11 b and other networks. In Proc. of MILCOM'06, 2006.
    • (2006) Proc. of MILCOM'06
    • Thuente, D.1    Acharya, M.2
  • 26
    • 45749134626 scopus 로고    scopus 로고
    • DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks
    • A. D. Wood, J. A. Stankovic, and G. Zhou. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In Proc. of SECON'07, 2007.
    • (2007) Proc. of SECON'07
    • Wood, A.D.1    Stankovic, J.A.2    Zhou, G.3
  • 27
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: attack and defense strategies. IEEE Network, 20(3):41-47, 2006.
    • (2006) IEEE Network , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 28
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of MobiHoc'05, pages 46-57, 2005.
    • (2005) Proc. of MobiHoc'05 , pp. 46-57
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 29
    • 57549104857 scopus 로고    scopus 로고
    • W. Xu, T. Wood, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proc. of Workshop on Wireless Security, page 80Ü89, 2004.
    • W. Xu, T. Wood, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proc. of Workshop on Wireless Security, page 80Ü89, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.