-
2
-
-
0347747244
-
Complex behavior at scale: An experimental study of low-power wrireless sensor networks
-
02-0013, UCLA
-
D. Ganesan, D. Estrin, A. Woo, D. Culler, B. Krishnamachari, and S. Wicker. Complex behavior at scale: An experimental study of low-power wrireless sensor networks. Technical Report CS TR 02-0013, UCLA, 2002.
-
(2002)
Technical Report CS TR
-
-
Ganesan, D.1
Estrin, D.2
Woo, A.3
Culler, D.4
Krishnamachari, B.5
Wicker, S.6
-
3
-
-
0025433623
-
Effect of worst case multiple partial-band noise and tone jammers on coded fh/ssma systems
-
May
-
E. Geraniotis. Effect of worst case multiple partial-band noise and tone jammers on coded fh/ssma systems. IEEE Journal on Selected Areas in Communications, 8(4):613-627, May 1990.
-
(1990)
IEEE Journal on Selected Areas in Communications
, vol.8
, Issue.4
, pp. 613-627
-
-
Geraniotis, E.1
-
4
-
-
33751056471
-
On accurate measurement of link quality in mulit-hop wireless mesh networks
-
K.-H. Kim and K. G. Shin. On accurate measurement of link quality in mulit-hop wireless mesh networks. ACM Mobicom, 2006.
-
(2006)
ACM Mobicom
-
-
Kim, K.-H.1
Shin, K.G.2
-
5
-
-
79959884874
-
Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
-
C. Kuo, M. Luk, R. Negi, and A. Perrig. Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes. ACM SenSys, 2007.
-
(2007)
ACM SenSys
-
-
Kuo, C.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
7
-
-
33745949686
-
Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols
-
Y. W. Law, L. van Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. ACM Security Sensor Ad-hoc Networks (SASN), 2005.
-
(2005)
ACM Security Sensor Ad-hoc Networks (SASN)
-
-
Law, Y.W.1
van Hoesel, L.2
Doumen, J.3
Hartel, P.4
Havinga, P.5
-
8
-
-
0034250315
-
Analysis of an on-off jamming situation as a dynamic game
-
Aug
-
Mallik, R.K., R. Scholtz, and G. Papavassilopoulos. Analysis of an on-off jamming situation as a dynamic game. IEEE Transactions on Communications, 48(8):1360-1373, Aug 2000.
-
(2000)
IEEE Transactions on Communications
, vol.48
, Issue.8
, pp. 1360-1373
-
-
Mallik, R.K.1
Scholtz, R.2
Papavassilopoulos, G.3
-
10
-
-
70349701730
-
-
MoteIV
-
MoteIV. http://www.moteiv.com/.
-
-
-
-
12
-
-
84931425598
-
Secret communication using artificial noise
-
R. Negi and S. Goel. Secret communication using artificial noise. Vehicular Technology Conference, 3:1906-1910, 2005.
-
(2005)
Vehicular Technology Conference
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
13
-
-
0027150705
-
IEEE Internatiomal Conference on Communications, ICC'93
-
1/3(2):473-477, May
-
L. Pap. A general jamming model of spread spectrum systems. IEEE Internatiomal Conference on Communications, ICC'93, 1/3(2):473-477, May 1993.
-
(1993)
-
-
Pap, L.1
-
15
-
-
37749041990
-
Experimental analysis of concurrent packet transmissions in low-power wireless networks
-
D. Son, B. Krishnamachari, and J. Heidemann. Experimental analysis of concurrent packet transmissions in low-power wireless networks. ACM SenSys, 2006.
-
(2006)
ACM SenSys
-
-
Son, D.1
Krishnamachari, B.2
Heidemann, J.3
-
16
-
-
34648849228
-
Understanding the causes of packet delivery success and failure in dense wireless sensor networks
-
K. Srinivasan, P. Dutta, A. Tavakoli, and P. Levis. Understanding the causes of packet delivery success and failure in dense wireless sensor networks. ACM SenSys, 2006.
-
(2006)
ACM SenSys
-
-
Srinivasan, K.1
Dutta, P.2
Tavakoli, A.3
Levis, P.4
-
18
-
-
0020497622
-
-
B. T. The gaussian test channel with an intelligent jammer. IEEE Transactions on Information Theory, 29(1):152-157, Jan 1983.
-
B. T. The gaussian test channel with an intelligent jammer. IEEE Transactions on Information Theory, 29(1):152-157, Jan 1983.
-
-
-
-
19
-
-
33745136118
-
Exploiting the capture effect of collision detection and recovery
-
K. Whitehouse, A. Woo, F. Jiang, J. Polastre, and D. Culler. Exploiting the capture effect of collision detection and recovery. IEEE Workshop on Embedded Networked Sensors, EmNetS-II, 2005.
-
(2005)
IEEE Workshop on Embedded Networked Sensors, EmNetS-II
-
-
Whitehouse, K.1
Woo, A.2
Jiang, F.3
Polastre, J.4
Culler, D.5
-
20
-
-
0036793924
-
Denial of service in sensor networks
-
A. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.A.2
-
21
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
May
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: Attack and defense strategies. IEEE Networks Special Issue on Sensor Networks, 20(3):41-47, May 2006.
-
(2006)
IEEE Networks Special Issue on Sensor Networks
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
22
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. ACM MobiHoc, pages 46-57, 2005.
-
(2005)
ACM MobiHoc
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
|