메뉴 건너뛰기




Volumn , Issue , 2009, Pages 2551-2555

Capabilities of low-power wireless jammers

Author keywords

[No Author keywords available]

Indexed keywords

HIGH PROBABILITY; IN-NETWORK; JAMMERS; LOW POWER; POWER LEVELS; TIME VARYING;

EID: 70349663855     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2009.5062185     Document Type: Conference Paper
Times cited : (16)

References (22)
  • 1
    • 70349712498 scopus 로고    scopus 로고
    • Dialog codes for secure wireless communications
    • OSU-CISRC-5/08-TR23
    • A. Arora and L. Sang. Dialog codes for secure wireless communications. Technical Report, Ohio State University, (OSU-CISRC-5/08-TR23), 2008.
    • (2008) Technical Report, Ohio State University
    • Arora, A.1    Sang, L.2
  • 3
    • 0025433623 scopus 로고
    • Effect of worst case multiple partial-band noise and tone jammers on coded fh/ssma systems
    • May
    • E. Geraniotis. Effect of worst case multiple partial-band noise and tone jammers on coded fh/ssma systems. IEEE Journal on Selected Areas in Communications, 8(4):613-627, May 1990.
    • (1990) IEEE Journal on Selected Areas in Communications , vol.8 , Issue.4 , pp. 613-627
    • Geraniotis, E.1
  • 4
    • 33751056471 scopus 로고    scopus 로고
    • On accurate measurement of link quality in mulit-hop wireless mesh networks
    • K.-H. Kim and K. G. Shin. On accurate measurement of link quality in mulit-hop wireless mesh networks. ACM Mobicom, 2006.
    • (2006) ACM Mobicom
    • Kim, K.-H.1    Shin, K.G.2
  • 5
    • 79959884874 scopus 로고    scopus 로고
    • Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
    • C. Kuo, M. Luk, R. Negi, and A. Perrig. Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes. ACM SenSys, 2007.
    • (2007) ACM SenSys
    • Kuo, C.1    Luk, M.2    Negi, R.3    Perrig, A.4
  • 9
  • 10
    • 70349701730 scopus 로고    scopus 로고
    • MoteIV
    • MoteIV. http://www.moteiv.com/.
  • 12
    • 84931425598 scopus 로고    scopus 로고
    • Secret communication using artificial noise
    • R. Negi and S. Goel. Secret communication using artificial noise. Vehicular Technology Conference, 3:1906-1910, 2005.
    • (2005) Vehicular Technology Conference , vol.3 , pp. 1906-1910
    • Negi, R.1    Goel, S.2
  • 13
    • 0027150705 scopus 로고
    • IEEE Internatiomal Conference on Communications, ICC'93
    • 1/3(2):473-477, May
    • L. Pap. A general jamming model of spread spectrum systems. IEEE Internatiomal Conference on Communications, ICC'93, 1/3(2):473-477, May 1993.
    • (1993)
    • Pap, L.1
  • 15
    • 37749041990 scopus 로고    scopus 로고
    • Experimental analysis of concurrent packet transmissions in low-power wireless networks
    • D. Son, B. Krishnamachari, and J. Heidemann. Experimental analysis of concurrent packet transmissions in low-power wireless networks. ACM SenSys, 2006.
    • (2006) ACM SenSys
    • Son, D.1    Krishnamachari, B.2    Heidemann, J.3
  • 16
    • 34648849228 scopus 로고    scopus 로고
    • Understanding the causes of packet delivery success and failure in dense wireless sensor networks
    • K. Srinivasan, P. Dutta, A. Tavakoli, and P. Levis. Understanding the causes of packet delivery success and failure in dense wireless sensor networks. ACM SenSys, 2006.
    • (2006) ACM SenSys
    • Srinivasan, K.1    Dutta, P.2    Tavakoli, A.3    Levis, P.4
  • 18
    • 0020497622 scopus 로고    scopus 로고
    • B. T. The gaussian test channel with an intelligent jammer. IEEE Transactions on Information Theory, 29(1):152-157, Jan 1983.
    • B. T. The gaussian test channel with an intelligent jammer. IEEE Transactions on Information Theory, 29(1):152-157, Jan 1983.
  • 20
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.A.2
  • 22
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. ACM MobiHoc, pages 46-57, 2005.
    • (2005) ACM MobiHoc , pp. 46-57
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.