-
1
-
-
0036793924
-
Denial of service in sensor networks
-
Wood AD, Stankovic JA. Denial of service in sensor networks. Computer 2002; 35(10): 54-62.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
3
-
-
84947612231
-
-
Gutierrez JA, Callaway EH, Barrett R. IEEE 802.15.4 Low-Rate Wireless Personal Area Networks. ISBN 0-7381-3677-5 SS95127, October 2003.
-
Gutierrez JA, Callaway EH, Barrett R. IEEE 802.15.4 Low-Rate Wireless Personal Area Networks. ISBN 0-7381-3677-5 SS95127, October 2003.
-
-
-
-
5
-
-
29844457889
-
The feasibility of launching and detectingjamming attacksinwireless networks
-
Urbana-Champaign, IL, USA, ISBN:1-59593-004-3
-
Xu W, Trappe W, Zhang Y, Wood T. The feasibility of launching and detectingjamming attacksinwireless networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana-Champaign, IL, USA, ISBN:1-59593-004-3, 2005, 46-57.
-
(2005)
Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
6
-
-
45749134626
-
DEEJAM: Defeating energyefficient jamming in IEEE 802.15.4-based wireless networks
-
San Diego, CA, June
-
Wood AD, Stankovic JA, Zhou G. DEEJAM: defeating energyefficient jamming in IEEE 802.15.4-based wireless networks. In The 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), San Diego, CA, June 2007.
-
(2007)
The 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
-
-
Wood, A.D.1
Stankovic, J.A.2
Zhou, G.3
-
7
-
-
84947616911
-
-
Crossbow Technology Inc
-
Crossbow Technology Inc. http://www.xbow.com/
-
-
-
-
8
-
-
33745949686
-
Energy-efficient link-layer jamming attacks against wirelesssensor network MAC protocols
-
Law Y, van Hoesel L, Doumen J, Hartel PH, Havinga PJM. Energy-efficient link-layer jamming attacks against wirelesssensor network MAC protocols. Proceedings of SASN'2005, 2005, 76-88.
-
(2005)
Proceedings of SASN'2005
, pp. 76-88
-
-
Law, Y.1
van Hoesel, L.2
Doumen, J.3
Hartel, P.H.4
Havinga, P.J.M.5
-
12
-
-
11244260535
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
New York, USA
-
Xu W, Wood T, Trappe W, Zhang Y. Channel surfing and spatial retreats: defenses against wireless denial of service. In WiSe'04: Proceedings of the 2004 ACM Workshop on Wireless Security, New York, USA, 2004, 80-89.
-
(2004)
WiSe'04: Proceedings of the 2004 ACM Workshop on Wireless Security
, pp. 80-89
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
-
15
-
-
33747378828
-
Jamming attack detection and countermeasures in wireless sensor network using ant system
-
Orlando, FL, April
-
Muraleedharan R, Osadciw L. Jamming attack detection and countermeasures in wireless sensor network using ant system. 2006 SPIE Symposium on Defense and Security, Orlando, FL, April 2006.
-
(2006)
2006 SPIE Symposium on Defense and Security
-
-
Muraleedharan, R.1
Osadciw, L.2
-
17
-
-
84947616586
-
-
Mobile Agents White Paper. General Magic, 1998.
-
Mobile Agents White Paper. General Magic, 1998.
-
-
-
-
18
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
Xu W, Ma K, Trappe W, Zhang Y. Jamming sensor networks: attack and defense strategies. IEEE Network Magazine 2006; 20: 41-47.
-
(2006)
IEEE Network Magazine
, vol.20
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
19
-
-
84947617096
-
-
802.15.4-2003. http://standards.ieee.org/getieee802/download/802.15.3- 2003.pdf
-
802.15.4-2003. http://standards.ieee.org/getieee802/download/802.15.3- 2003.pdf
-
-
-
-
20
-
-
84947611714
-
-
802.15.4-2006. http://standards.ieee.org/getieee802/download/802.15.4- 2006.pdf
-
802.15.4-2006. http://standards.ieee.org/getieee802/download/802.15.4- 2006.pdf
-
-
-
-
22
-
-
33745058163
-
Link-layer jamming attacks on S-MAC
-
IEEE, Online, Available
-
Law Y, Hartel P, den Hartog J, Havinga P. Link-layer jamming attacks on S-MAC. In 2nd European Workshop on Wireless Sensor Networks (EWSN 2005). IEEE, 2005, 217-225. [Online]. Available: http://ieeexplore.ieee.org/iel5/9875/ 31391/01462013.pdf
-
(2005)
2nd European Workshop on Wireless Sensor Networks (EWSN 2005)
, pp. 217-225
-
-
Law, Y.1
Hartel, P.2
den Hartog, J.3
Havinga, P.4
-
23
-
-
84947611534
-
-
Zigbee. http://www.zigbee.org/en/index.asp
-
Zigbee
-
-
-
25
-
-
0242695457
-
-
Artech House Publishers, Boston, MA, USA
-
Adamy DL, Adamy D. EW 102: A Second Course in Electronic Warfare. Artech House Publishers, Boston, MA, USA, 2004.
-
(2004)
EW 102: A Second Course in Electronic Warfare
-
-
Adamy, D.L.1
Adamy, D.2
-
26
-
-
84947617140
-
-
Accessed 10/5/2008
-
Radio Jamming Info. http://www.radiojamming.info/(Accessed 10/5/2008).
-
Radio Jamming Info
-
-
-
29
-
-
0033713473
-
Multipath characteristics of impulse radio channels
-
Lee H, Han B, Shin Y, Im S. Multipath characteristics of impulse radio channels. IEEE Vehicular Technology Conference Proceedings, 2000, 2487-2491.
-
(2000)
IEEE Vehicular Technology Conference Proceedings
, pp. 2487-2491
-
-
Lee, H.1
Han, B.2
Shin, Y.3
Im, S.4
-
32
-
-
11244313064
-
Uwb wireless sensor networks: Uwen-a practical example
-
Oppermann I, Stoica L, Rabbachin A, Shelby Z, Haapola J. Uwb wireless sensor networks: Uwen-a practical example. IEEE Communications Magazine 2004; 42(12): 27-32.
-
(2004)
IEEE Communications Magazine
, vol.42
, Issue.12
, pp. 27-32
-
-
Oppermann, I.1
Stoica, L.2
Rabbachin, A.3
Shelby, Z.4
Haapola, J.5
-
33
-
-
0003715466
-
-
2nd edn, John Wiley & Sons, New York, USA, ISBN: 978-0-471-02590-0
-
Stutzman W, Thiele G. Antenna Theory and Design (2nd edn). John Wiley & Sons, New York, USA, ISBN: 978-0-471-02590-0, 1997.
-
(1997)
Antenna Theory and Design
-
-
Stutzman, W.1
Thiele, G.2
-
34
-
-
42549087802
-
Transport layer and security protocols for ad hoc wireless networks
-
Prentice Hall PTR, Eaglewood, Cliffs, NJ
-
Murthy CSR, Manoj BS. Transport layer and security protocols for ad hoc wireless networks. In Ad Hoc Wireless Networks: Architectures and Protocols. Prentice Hall PTR, Eaglewood, Cliffs, NJ, 2004.
-
(2004)
Ad Hoc Wireless Networks: Architectures and Protocols
-
-
Murthy, C.S.R.1
Manoj, B.S.2
-
35
-
-
0035789618
-
On the performance of ad hoc networks with beamforming antennas
-
Long Beach, California, USA, October
-
Ramanathan R. On the performance of ad hoc networks with beamforming antennas. ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobi-Hoc'01), Long Beach, California, USA, October 2001, 95-105.
-
(2001)
ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobi-Hoc'01)
, pp. 95-105
-
-
Ramanathan, R.1
-
36
-
-
0036346205
-
Energy efficient communications in ad hoc networks using directional antennas
-
NY, USA, June
-
Spyropoulos A, Raghavendra CS. Energy efficient communications in ad hoc networks using directional antennas. IEEE Conference on Computer Communications (INFOCOM'02), Vol. 1, NY, USA, June 2002, 220-228.
-
(2002)
IEEE Conference on Computer Communications (INFOCOM'02)
, vol.1
, pp. 220-228
-
-
Spyropoulos, A.1
Raghavendra, C.S.2
-
37
-
-
0035789894
-
An adaptive MAC and directional routing protocol for ad hoc wireless network using directional ESPAR antenna
-
Long Beach, California, USA, October
-
Bandyopadhyay S, Hasuike K, Horisawa S, Tawara S. An adaptive MAC and directional routing protocol for ad hoc wireless network using directional ESPAR antenna. In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking & Computing 2001(MOBIHOC 2001), Long Beach, California, USA, October 2001, 243-246.
-
(2001)
Proceedings of the ACM Symposium on Mobile Ad Hoc Networking & Computing 2001(MOBIHOC 2001)
, pp. 243-246
-
-
Bandyopadhyay, S.1
Hasuike, K.2
Horisawa, S.3
Tawara, S.4
-
38
-
-
0033907686
-
Medium access control protocols using directional antennas in ad hoc networks
-
March
-
Ko YB, Shankarkumar V, Vaidya NH. Medium access control protocols using directional antennas in ad hoc networks. In Proceedings of the IEEE INFOCOM 2000, Vol. 1, March 2000, 13-21.
-
(2000)
Proceedings of the IEEE INFOCOM 2000
, vol.1
, pp. 13-21
-
-
Ko, Y.B.1
Shankarkumar, V.2
Vaidya, N.H.3
-
39
-
-
17144372253
-
Analysis of multipath routing for ad hoc networks using directional antennas
-
September
-
Li Y, Man H. Analysis of multipath routing for ad hoc networks using directional antennas. Vehicular Technology Conference, IEEE 60th, Vol. 4, September 2004, 2759-2763.
-
(2004)
Vehicular Technology Conference, IEEE 60th
, vol.4
, pp. 2759-2763
-
-
Li, Y.1
Man, H.2
-
40
-
-
66249116481
-
Multipath routing in ad hoc wireless networks with omni directional and directional antenna: A comparative study
-
Calcutta, India, December
-
Roy S, Bandyopadhyay S, Ueda T, Hasuike K. Multipath routing in ad hoc wireless networks with omni directional and directional antenna: a comparative study. In Proceedings of the 4th International Workshop of Distributed Computing, Mobile and Wireless Computing, IWDC 2002, Calcutta, India, December 2002, 184-191.
-
(2002)
Proceedings of the 4th International Workshop of Distributed Computing, Mobile and Wireless Computing, IWDC 2002
, pp. 184-191
-
-
Roy, S.1
Bandyopadhyay, S.2
Ueda, T.3
Hasuike, K.4
-
42
-
-
33745943760
-
On connectivity in ad hoc networks under jamming using directional antennas and mobility
-
LNCS
-
Noubir G. On connectivity in ad hoc networks under jamming using directional antennas and mobility. In Proceedings of the Wired/Wireless Internet Communications Conference, LNCS Vol. 2957, 2004, 186-200.
-
(2004)
Proceedings of the Wired/Wireless Internet Communications Conference
, vol.2957
, pp. 186-200
-
-
Noubir, G.1
-
44
-
-
84947615578
-
-
RFC 2898. PKCS #5: Password-based cryptography specification version 2.0: http://rfc.net/rfc2898.html
-
RFC 2898. PKCS #5: Password-based cryptography specification version 2.0: http://rfc.net/rfc2898.html
-
-
-
-
45
-
-
0031599142
-
Mersenne Twister: A 623- dimensionally equidistributed uniform pseudo-random number generator
-
Matsumoto M, Nishimura T. Mersenne Twister: a 623- dimensionally equidistributed uniform pseudo-random number generator. ACM Transactions on Modeling and Computer Simulation 1998; 8: 3-30.
-
(1998)
ACM Transactions on Modeling and Computer Simulation
, vol.8
, pp. 3-30
-
-
Matsumoto, M.1
Nishimura, T.2
-
46
-
-
13244278879
-
The flooding time synchronization protocol
-
Technical Report ISIS-04-501, Institute for Software Integrated Systems, Vanderbilt University, Nashville Tennessee
-
Maroti M, Kusy B, Simon G, Ledeczi A. The flooding time synchronization protocol. Technical Report ISIS-04-501, Institute for Software Integrated Systems, Vanderbilt University, Nashville Tennessee, 2004.
-
(2004)
-
-
Maroti, M.1
Kusy, B.2
Simon, G.3
Ledeczi, A.4
-
47
-
-
33847210540
-
Analysis and design of a frequency-hopped spreadspectrum transceiver for wireless personal communications
-
Ph.D. dissertation, University of California, Los Angeles, Online, Available
-
Min J. Analysis and design of a frequency-hopped spreadspectrum transceiver for wireless personal communications. Ph.D. dissertation, University of California, Los Angeles, 1995. [Online]. Available: http://www.icsl.ucla.edu/aagroup/PDF files/tcvr-arch.pdf
-
(1995)
-
-
Min, J.1
-
48
-
-
85076636549
-
Wireless integrated network sensors: Toward low-cost and robust self-organizing security networks
-
Online, Available
-
Pottie GJ, Clare LP. Wireless integrated network sensors: toward low-cost and robust self-organizing security networks. In Sensors, C3I, Information, and Training Technologies for Law Enforcement, ser. SPIE Proceedings, Vol. 3577, 1999, 86-95. [Online]. Available: http://wins.rsc.rockwell.com/ publications/spie3577-12.pdf
-
(1999)
Sensors, C3I, Information, and Training Technologies for Law Enforcement, ser. SPIE Proceedings
, vol.3577
, pp. 86-95
-
-
Pottie, G.J.1
Clare, L.P.2
-
49
-
-
67749151395
-
A peek into pandora's box: Direct sequence vs. Frequency hopped spread spectrum
-
eds, Kluwer Academic Publishers: Norwell, MA
-
Morrow RK Jr. A peek into pandora's box: direct sequence vs. Frequency hopped spread spectrum. In Wireless Personal Communications: Emerging Technologies For Enhanced Communications, Tranter WH, Rappaport TS, Woerner BD, Reed JW (eds). Kluwer Academic Publishers: Norwell, MA, 2006; 305-314.
-
(2006)
Wireless Personal Communications: Emerging Technologies For Enhanced Communications
, pp. 305-314
-
-
Morrow Jr., R.K.1
-
51
-
-
0035687963
-
Performance of a very low power wireless protocol
-
IEEE
-
Jabs JL, Chang CH, Tingley R. Performance of a very low power wireless protocol. Global Telecommunications Conference, GLOBECOM'01. IEEE, Vol. 5, 2001, 2825-2831.
-
(2001)
Global Telecommunications Conference, GLOBECOM'01
, vol.5
, pp. 2825-2831
-
-
Jabs, J.L.1
Chang, C.H.2
Tingley, R.3
-
52
-
-
33845277157
-
-
Dublin, Ireland, 25-27 October
-
Lee TH, Marshall A, Zhou B. Modeling Energy Consumption in Error-prone IEEE 802.11-based Wireless Ad-hoc Networks, 9th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services, MMNS 2006, Dublin, Ireland, 25-27 October 2006.
-
(2006)
Modeling Energy Consumption in Error-prone IEEE 802.11-based Wireless Ad-hoc Networks, 9th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services, MMNS 2006
-
-
Lee, T.H.1
Marshall, A.2
Zhou, B.3
|