-
1
-
-
42149164305
-
A multi-channel defense against jamming attacks in wireless sensor networks
-
G. Alnifie and R. Simon. A multi-channel defense against jamming attacks in wireless sensor networks. In Proc. of Q2SWinet'07, pages 95-104, 2007.
-
(2007)
Proc. of Q2SWinet'07
, pp. 95-104
-
-
Alnifie, G.1
Simon, R.2
-
2
-
-
51349091564
-
On the performance of ieee 802.11 under jamming
-
E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa. On the performance of ieee 802.11 under jamming. In Proc. of IEEE Infocom'08, page 1265, 2008.
-
(2008)
Proc. of IEEE Infocom'08
, pp. 1265
-
-
Bayraktaroglu, E.1
King, C.2
Liu, X.3
Noubir, G.4
Rajaraman, R.5
Thapa, B.6
-
3
-
-
32144452400
-
Adversarial contention resolution for simple channels
-
Michael A. Bender, Martin Farach-Colton, Simai He, Bradley C. Kuszmaul, and Charles E. Leiserson. Adversarial contention resolution for simple channels. In Proc. of SPAA'05, pages 325-332, 2005.
-
(2005)
Proc. of SPAA'05
, pp. 325-332
-
-
Bender, M.A.1
Farach-Colton, M.2
He, S.3
Kuszmaul, B.C.4
Leiserson, C.E.5
-
4
-
-
33748061660
-
Jamming and sensing of encrypted wireless ad hoc networks
-
T. Brown, J. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proc. of MobiHoc'06, pages 120-130, 2006.
-
(2006)
Proc. of MobiHoc'06
, pp. 120-130
-
-
Brown, T.1
James, J.2
Sethi, A.3
-
5
-
-
37749010823
-
Cross-layer jamming detection and mitigation in wireless broadcast networks
-
J. T. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proc. of MobiCom'07, pages 346-349, 2007.
-
(2007)
Proc. of MobiCom'07
, pp. 346-349
-
-
Chiang, J.T.1
Hu, Y.-C.2
-
6
-
-
33748697400
-
Adversarial queuing on the multiple-access channel
-
Bogdan S. Chlebus, Dariusz R. Kowalski, and Mariusz A. Rokicki. Adversarial queuing on the multiple-access channel. In Proc. of PODC'06, pages 92-101, 2006.
-
(2006)
Proc. of PODC'06
, pp. 92-101
-
-
Chlebus, B.S.1
Kowalski, D.R.2
Rokicki, M.A.3
-
7
-
-
33745192089
-
Broadcasting algorithms in radio networks with unknown topology
-
A. Czumaj and W. Rytter. Broadcasting algorithms in radio networks with unknown topology. Journal of Algorithms, 60(2): 115-143, 2006.
-
(2006)
Journal of Algorithms
, vol.60
, Issue.2
, pp. 115-143
-
-
Czumaj, A.1
Rytter, W.2
-
8
-
-
57549107865
-
-
S. Gilbert, R. Guerraoui, and C. Newport. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In Proc. of OPODIS'06, 2006.
-
S. Gilbert, R. Guerraoui, and C. Newport. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In Proc. of OPODIS'06, 2006.
-
-
-
-
9
-
-
0002919403
-
Contention resolution with constant expected delay
-
Leslie Ann Goldberg, Philip D. Mackenzie, Mike Paterson, and Aravind Srinivasan. Contention resolution with constant expected delay. Journal of the ACM, 47(6): 1048-1096, 2000.
-
(2000)
Journal of the ACM
, vol.47
, Issue.6
, pp. 1048-1096
-
-
Ann Goldberg, L.1
Mackenzie, P.D.2
Paterson, M.3
Srinivasan, A.4
-
10
-
-
0001153669
-
Analysis of backoff protocols for mulitiple accesschannels
-
Johan Hastad, Tom Leighton, and Brian Rogoff. Analysis of backoff protocols for mulitiple accesschannels. SIAM Journal on Computing, 25(4):740-774, 1996.
-
(1996)
SIAM Journal on Computing
, vol.25
, Issue.4
, pp. 740-774
-
-
Hastad, J.1
Leighton, T.2
Rogoff, B.3
-
11
-
-
57549097071
-
Medium access control (MAC) and physical specifications
-
IEEE
-
IEEE. Medium access control (MAC) and physical specifications. In 1EEE P802. II/D10, 1999.
-
(1999)
1EEE P802. II/D10
-
-
-
13
-
-
32144443992
-
Constant density spanners for wireless ad hoc networks
-
K. Kothapalli, C. Scheideler, M. Onus, and A. Richa. Constant density spanners for wireless ad hoc networks. In Proc. of SPAA'05, pages 116-125, 2005.
-
(2005)
Proc. of SPAA'05
, pp. 116-125
-
-
Kothapalli, K.1
Scheideler, C.2
Onus, M.3
Richa, A.4
-
15
-
-
18844401150
-
Performance analysis of exponential backoff
-
Byung-Jae Kwak, Nah-Oak Song, and Leonard E. Miller. Performance analysis of exponential backoff. IEEE/ACM Transactions on Networking, 13(2):343-355, 2005.
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.2
, pp. 343-355
-
-
Kwak, B.-J.1
Song, N.-O.2
Miller, L.E.3
-
16
-
-
33745949686
-
Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols
-
Y. W. Law, L. van Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In Proc. of'SASN'05, pages 76-88, 2005.
-
(2005)
Proc. of'SASN'05
, pp. 76-88
-
-
Law, Y.W.1
van Hoesel, L.2
Doumen, J.3
Hartel, P.4
Havinga, P.5
-
17
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
M. Li, I. Koutsopoulos, and R. Poovendran. Optimal jamming attacks and network defense policies in wireless sensor networks. In Proc. of Infocom'07, pages 1307-1315. 2007.
-
(2007)
Proc. of Infocom'07
, pp. 1307-1315
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
18
-
-
34548295754
-
Spread: Foiling smart jammers using multi-layer agility
-
Xin Liu, Guevara Noubir, Ravi Sundaram, and San Tan. Spread: Foiling smart jammers using multi-layer agility. In Proc. of Infocom'07, pages 2536-2540, 2007.
-
(2007)
Proc. of Infocom'07
, pp. 2536-2540
-
-
Liu, X.1
Noubir, G.2
Sundaram, R.3
Tan, S.4
-
19
-
-
34548307187
-
Using channel hopping to increase 802.11 resilience to jamming attacks
-
Vishnu Navda, Aniruddha Bohra, Samrat Ganguly, and Dan Rubenstein. Using channel hopping to increase 802.11 resilience to jamming attacks. In Proc. of Infocom'07, pages 2526-2530, 2007.
-
(2007)
Proc. of Infocom'07
, pp. 2526-2530
-
-
Navda, V.1
Bohra, A.2
Ganguly, S.3
Rubenstein, D.4
-
20
-
-
33645628961
-
Jamming analysis of MAC protocols
-
Technical report, Carnegie Mellon University
-
R. Negi and A. Perrig. Jamming analysis of MAC protocols. Technical report, Carnegie Mellon University, 2003.
-
(2003)
-
-
Negi, R.1
Perrig, A.2
-
21
-
-
57549114031
-
Feasibility and complexity of broadcasting with random transmission failures
-
A. Pelc and D. Peleg. Feasibility and complexity of broadcasting with random transmission failures. In Proc. of PODC'05, 2005.
-
(2005)
Proc. of PODC'05
-
-
Pelc, A.1
Peleg, D.2
-
22
-
-
0032107964
-
Stochastic contention resolution with short delays
-
Prabhakar Raghavan and Eli Upfal. Stochastic contention resolution with short delays. SIAM Journal on Computing, 28(2):709-719, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.2
, pp. 709-719
-
-
Raghavan, P.1
Upfal, E.2
-
23
-
-
0001595705
-
Chernoff-Hoeffding bounds for applications with limited independence
-
J. Schmidt, A. Siegel, and A. Srinivasan. Chernoff-Hoeffding bounds for applications with limited independence. SIAM Journal on Discrete Mathematics, 8(2):223-250, 1995.
-
(1995)
SIAM Journal on Discrete Mathematics
, vol.8
, Issue.2
, pp. 223-250
-
-
Schmidt, J.1
Siegel, A.2
Srinivasan, A.3
-
25
-
-
34548311320
-
Intelligent jamming in wireless networks with applications to 802.11 b and other networks
-
David Thuente and Mithun Acharya. Intelligent jamming in wireless networks with applications to 802.11 b and other networks. In Proc. of MILCOM'06, 2006.
-
(2006)
Proc. of MILCOM'06
-
-
Thuente, D.1
Acharya, M.2
-
26
-
-
45749134626
-
DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks
-
A. D. Wood, J. A. Stankovic, and G. Zhou. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In Proc. of SECON'07, 2007.
-
(2007)
Proc. of SECON'07
-
-
Wood, A.D.1
Stankovic, J.A.2
Zhou, G.3
-
27
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: attack and defense strategies. IEEE Network, 20(3):41-47, 2006.
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
28
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of MobiHoc'05, pages 46-57, 2005.
-
(2005)
Proc. of MobiHoc'05
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
29
-
-
57549104857
-
-
W. Xu, T. Wood, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proc. of Workshop on Wireless Security, page 80Ü89, 2004.
-
W. Xu, T. Wood, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proc. of Workshop on Wireless Security, page 80Ü89, 2004.
-
-
-
|