메뉴 건너뛰기




Volumn 9, Issue 8, 2010, Pages 1119-1133

Optimal jamming attack strategies and network defense policies in wireless sensor networks

Author keywords

Jamming; Jamming detection and mitigation; Optimization; Security; Wireless multiple access; Wireless sensor network

Indexed keywords

ATTACK STRATEGIES; AVERAGE-CASE; CHANNEL ACCESS PROBABILITIES; COMMUNICATION LINKS; DEFENSE MECHANISM; JAMMER ACTIONS; JAMMING PROBABILITY; MONI-TORING NODES; MULTIPLE ACCESS; NETWORK CHANNEL; NETWORK DEFENSE; OPTIMAL DETECTION; OPTIMIZATION PROBLEMS; SECURITY; SINGLE-CHANNEL; TRANSMISSION RANGES; WIRELESS MULTIPLE ACCESS;

EID: 77953766580     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2010.75     Document Type: Article
Times cited : (132)

References (21)
  • 1
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and defense policies in wireless sensor networks
    • M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal Jamming Attacks and Defense Policies in Wireless Sensor Networks," Proc. IEEE INFOCOM, 2007.
    • (2007) Proc. IEEE INFOCOM
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 3
    • 85008044268 scopus 로고    scopus 로고
    • Selfish MAC layer misbehavior in wireless networks
    • Sept./Oct.
    • P. Kyasanur and N. Vaidya, "Selfish MAC Layer Misbehavior in Wireless Networks," IEEE Trans. Mobile Computing, vol.4, no.5, pp. 502-516, Sept./Oct. 2005.
    • (2005) IEEE Trans. Mobile Computing , vol.4 , Issue.5 , pp. 502-516
    • Kyasanur, P.1    Vaidya, N.2
  • 5
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct.
    • A.D. Wood and J.A. Stankovic, "Denial of Service in Sensor Networks," Computer, vol.35, no.10, pp. 54-62, Oct. 2002.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 7
    • 0034250315 scopus 로고    scopus 로고
    • Analysis of an on-off jamming situation as a dynamic game
    • Aug.
    • R. Mallik, R. Scholtz, and G. Papavassilopoulos, "Analysis of an On-Off Jamming Situation as a Dynamic Game," IEEE Trans. Comm., vol.48, no.8, pp. 1360-1373, Aug. 2000.
    • (2000) IEEE Trans. Comm. , vol.48 , Issue.8 , pp. 1360-1373
    • Mallik, R.1    Scholtz, R.2    Papavassilopoulos, G.3
  • 9
    • 33746342121 scopus 로고    scopus 로고
    • Quarantine region scheme to mitigate spam attacks in wireless sensor networks
    • Aug.
    • V. Coskun, E. Cayirci, A. Levi, and S. Sancak, "Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol.5, no.8, pp. 1074-1086, Aug. 2006.
    • (2006) IEEE Trans. Mobile Computing , vol.5 , Issue.8 , pp. 1074-1086
    • Coskun, V.1    Cayirci, E.2    Levi, A.3    Sancak, S.4
  • 10
    • 60449113417 scopus 로고    scopus 로고
    • Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
    • Feb.
    • Y.W. Law, L. van Hoesel, J. Doumen, P. Hartel, and P. Havinga, "Energy-Efficient Link-Layer Jamming Attacks Against Wireless Sensor Network MAC Protocols," ACM Trans. Sensor Networks, vol.5, no.1, pp. 1-38, Feb. 2009.
    • (2009) ACM Trans. Sensor Networks , vol.5 , Issue.1 , pp. 1-38
    • Law, Y.W.1    Van Hoesel, L.2    Doumen, J.3    Hartel, P.4    Havinga, P.5
  • 11
    • 18844450713 scopus 로고    scopus 로고
    • On link-layer denial of service in data wireless LANs
    • May
    • G. Lin and G. Noubir, "On Link-Layer Denial of Service in Data Wireless LANs," Wiley J. Wireless Comm. and Mobile Computing, vol.5, no.3, pp. 273-284, May 2005.
    • (2005) Wiley J. Wireless Comm. and Mobile Computing , vol.5 , Issue.3 , pp. 273-284
    • Lin, G.1    Noubir, G.2
  • 12
    • 33845635202 scopus 로고    scopus 로고
    • Wormhole-based antijamming techniques in sensor networks
    • Jan.
    • M. Cagalj, S. Capkun, and J.-P. Hubaux, "Wormhole-Based AntiJamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing, vol.6, no.1, pp. 1-15, Jan. 2007.
    • (2007) IEEE Trans. Mobile Computing , vol.6 , Issue.1 , pp. 1-15
    • Cagalj, M.1    Capkun, S.2    Hubaux, J.-P.3
  • 13
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. ACM MobiHoc, 2005.
    • (2005) Proc. ACM MobiHoc
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 17
  • 19
    • 0033349954 scopus 로고    scopus 로고
    • Multi-hypothesis sequential probability ratio tests\part i: Asymptotic optimality
    • Nov.
    • V.P. Dragalin, A.G. Tartakovsky, and V.V. Veeravalli, "Multi-hypothesis Sequential Probability Ratio Tests\Part I: Asymptotic Optimality," IEEE Trans. Information Theory, vol.45, no.7, pp. 2448-2461, Nov. 1999.
    • (1999) IEEE Trans. Information Theory , vol.45 , Issue.7 , pp. 2448-2461
    • Dragalin, V.P.1    Tartakovsky, A.G.2    Veeravalli, V.V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.