메뉴 건너뛰기




Volumn 410, Issue 6-7, 2009, Pages 546-569

Of malicious motes and suspicious sensors. On the efficiency of malicious interference in wireless networks

Author keywords

Ad hoc networks; Algorithms; Fault tolerance; Sensor networks; Wireless radio networks

Indexed keywords

CONTROL THEORY; ERRORS; FAULT TOLERANCE; INFORMATION THEORY; JAMMING; QUALITY ASSURANCE; RADIO BROADCASTING; RELIABILITY; SENSOR NETWORKS; SENSORS; WIRELESS AD HOC NETWORKS; WIRELESS SENSOR NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 58549116731     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2008.10.008     Document Type: Article
Times cited : (24)

References (20)
  • 1
    • 33748061660 scopus 로고    scopus 로고
    • T.X. Brown, J.E. James, A. Sethi, Jamming and sensing of encrypted wireless ad hoc networks, Technical Report CU-CS-1005-06, UC Boulder, 2006
    • T.X. Brown, J.E. James, A. Sethi, Jamming and sensing of encrypted wireless ad hoc networks, Technical Report CU-CS-1005-06, UC Boulder, 2006
  • 4
    • 10444234209 scopus 로고    scopus 로고
    • Broadcast in radio networks tolerating byzantine adversarial behavior
    • Koo C.Y. Broadcast in radio networks tolerating byzantine adversarial behavior. Principles of Distributed Computing (2004) 275-282
    • (2004) Principles of Distributed Computing , pp. 275-282
    • Koo, C.Y.1
  • 6
    • 10444286785 scopus 로고    scopus 로고
    • Broadcasting with locally bounded byzantine faults
    • Pelc A., and Peleg D. Broadcasting with locally bounded byzantine faults. Information Processing Letters 93 3 (2005) 109-115
    • (2005) Information Processing Letters , vol.93 , Issue.3 , pp. 109-115
    • Pelc, A.1    Peleg, D.2
  • 8
    • 32344449382 scopus 로고    scopus 로고
    • Feasibility and complexity of broadcasting with random transmission failures
    • Pelc A., and Peleg D. Feasibility and complexity of broadcasting with random transmission failures. Principles of Distributed Computing (2005) 334-341
    • (2005) Principles of Distributed Computing , pp. 334-341
    • Pelc, A.1    Peleg, D.2
  • 9
    • 57549092507 scopus 로고    scopus 로고
    • Optimal f-reliable protocols for the do-all problem on single-hop wireless networks
    • Clementi A., Monti A., and Silvestri R. Optimal f-reliable protocols for the do-all problem on single-hop wireless networks. Algorithms and Computation (2002) 320-331
    • (2002) Algorithms and Computation , pp. 320-331
    • Clementi, A.1    Monti, A.2    Silvestri, R.3
  • 11
    • 84896767730 scopus 로고    scopus 로고
    • E. Kranakis, D. Krizanc, A. Pelc, Fault-tolerant broadcasting in radio networks, in: European Symposium on Algorithms, 1998, pp. 283-294
    • E. Kranakis, D. Krizanc, A. Pelc, Fault-tolerant broadcasting in radio networks, in: European Symposium on Algorithms, 1998, pp. 283-294
  • 12
    • 1642420431 scopus 로고    scopus 로고
    • Round robin is optimal for fault-tolerant broadcasting on wireless networks
    • Clementi A., Monti A., and Silvestri R. Round robin is optimal for fault-tolerant broadcasting on wireless networks. Journal of Parallel Distributed Computing 64 1 (2004) 89-96
    • (2004) Journal of Parallel Distributed Computing , vol.64 , Issue.1 , pp. 89-96
    • Clementi, A.1    Monti, A.2    Silvestri, R.3
  • 14
    • 58549117455 scopus 로고    scopus 로고
    • M. Stahlberg, Radio jamming attacks against two popular mobile networks, in: Helsinki University of Technology Seminar on Network Security, 2000
    • M. Stahlberg, Radio jamming attacks against two popular mobile networks, in: Helsinki University of Technology Seminar on Network Security, 2000
  • 15
    • 58549114360 scopus 로고    scopus 로고
    • R. Negi, A. Perrig, Jamming analysis of mac protocols, Technical Report, Carnegie Mellon University, 2003
    • R. Negi, A. Perrig, Jamming analysis of mac protocols, Technical Report, Carnegie Mellon University, 2003
  • 16
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • Hu Y., and Perrig A. A survey of secure wireless ad hoc routing. IEEE Security and Privacy Magazine 02 3 (2004) 28-39
    • (2004) IEEE Security and Privacy Magazine , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.1    Perrig, A.2
  • 17
    • 58549087516 scopus 로고    scopus 로고
    • V. Gupta, S. Krishnamurthy, S. Faloutsos, Denial of service attacks at the mac layer in wireless ad hoc networks, in: Military Communications Conference, 2002
    • V. Gupta, S. Krishnamurthy, S. Faloutsos, Denial of service attacks at the mac layer in wireless ad hoc networks, in: Military Communications Conference, 2002
  • 18
    • 33745136118 scopus 로고    scopus 로고
    • A. Woo, K. Whitehouse, F. Jiang, J. Polastre, D. Culler, Exploiting the capture effect for collision detection and recovery, in: Workshop on Embedded Networked Sensors, 2005, pp. 45-52
    • A. Woo, K. Whitehouse, F. Jiang, J. Polastre, D. Culler, Exploiting the capture effect for collision detection and recovery, in: Workshop on Embedded Networked Sensors, 2005, pp. 45-52
  • 19
    • 65549143661 scopus 로고    scopus 로고
    • A. Clementi, A. Monti, R. Silvestri, Selective families, superimposed codes, and broadcasting on unknown radio networks, in: Symposium on Discrete algorithms, Philadelphia, PA, USA, 2001, pp. 709-718
    • A. Clementi, A. Monti, R. Silvestri, Selective families, superimposed codes, and broadcasting on unknown radio networks, in: Symposium on Discrete algorithms, Philadelphia, PA, USA, 2001, pp. 709-718
  • 20
    • 32344453951 scopus 로고    scopus 로고
    • On selection problem in radio networks
    • ACM Press, New York, NY, USA
    • Kowalski D.R. On selection problem in radio networks. Principles of Distributed Computing (2005), ACM Press, New York, NY, USA 158-166
    • (2005) Principles of Distributed Computing , pp. 158-166
    • Kowalski, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.