메뉴 건너뛰기




Volumn 6343 LNCS, Issue , 2010, Pages 179-193

A jamming-resistant MAC protocol for multi-hop wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

ARBITRARY CONSTANTS; ASYMPTOTICALLY OPTIMAL; JAMMERS; MAC PROTOCOL; MEDIUM ACCESS CONTROL PROTOCOLS; MULTIHOP WIRELESS NETWORK; SINGLE CHANNELS; TIME STEP; UNIT DISK GRAPHS; WIRELESS CHANNEL;

EID: 78649863202     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15763-9_17     Document Type: Conference Paper
Times cited : (68)

References (44)
  • 1
    • 42149164305 scopus 로고    scopus 로고
    • A multi-channel defense against jamming attacks in wireless sensor networks
    • Alnifie, G., Simon, R.: A multi-channel defense against jamming attacks in wireless sensor networks. In: Proc. of Q2SWinet '07, pp. 95-104 (2007)
    • (2007) Proc. of Q2SWinet '07 , pp. 95-104
    • Alnifie, G.1    Simon, R.2
  • 2
    • 77956259825 scopus 로고    scopus 로고
    • A jamming-resistant MAC protocol for single-hop wireless networks
    • Awerbuch, B., Richa, A., Scheideler, C.: A jamming-resistant MAC protocol for single-hop wireless networks. In: Proc. of PODC '08 (2008)
    • (2008) Proc. of PODC '08
    • Awerbuch, B.1    Richa, A.2    Scheideler, C.3
  • 5
    • 33748061660 scopus 로고    scopus 로고
    • Jamming and sensing of encrypted wireless ad hoc networks
    • Brown, T., James, J., Sethi, A.: Jamming and sensing of encrypted wireless ad hoc networks. In: Proc. of MobiHoc '06, pp. 120-130 (2006)
    • (2006) Proc. of MobiHoc '06 , pp. 120-130
    • Brown, T.1    James, J.2    Sethi, A.3
  • 6
    • 37749010823 scopus 로고    scopus 로고
    • Cross-layer jamming detection and mitigation in wireless broadcast networks
    • Chiang, J., Hu, Y.-C.: Cross-layer jamming detection and mitigation in wireless broadcast networks. In: Proc. of MobiCom '07, pp. 346-349 (2007)
    • (2007) Proc. of MobiCom '07 , pp. 346-349
    • Chiang, J.1    Hu, Y.-C.2
  • 8
    • 33745192089 scopus 로고    scopus 로고
    • Broadcasting algorithms in radio networks with unknown topology
    • Czumaj, A., Rytter, W.: Broadcasting algorithms in radio networks with unknown topology. Journal of Algorithms 60(2), 115 (2006)
    • (2006) Journal of Algorithms , vol.60 , Issue.2 , pp. 115
    • Czumaj, A.1    Rytter, W.2
  • 11
    • 38049032492 scopus 로고    scopus 로고
    • Gossiping in a multi-channel radio network: An oblivious approach to coping with malicious interference
    • Pelc, A. (ed.) DISC 2007. Springer, Heidelberg
    • Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.: Gossiping in a multi-channel radio network: An oblivious approach to coping with malicious interference. In: Pelc, A. (ed.) DISC 2007. LNCS, vol. 4731, pp. 208-222. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4731 , pp. 208-222
    • Dolev, S.1    Gilbert, S.2    Guerraoui, R.3    Newport, C.4
  • 13
    • 38049032492 scopus 로고    scopus 로고
    • Gossiping in a multi-channel radio network
    • Pelc, A. (ed.) DISC 2007. Springer, Heidelberg
    • Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.C.: Gossiping in a multi-channel radio network. In: Pelc, A. (ed.) DISC 2007. LNCS, vol. 4731, pp. 208-222. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4731 , pp. 208-222
    • Dolev, S.1    Gilbert, S.2    Guerraoui, R.3    Newport, C.C.4
  • 16
    • 84885701483 scopus 로고    scopus 로고
    • Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks
    • Shvartsman, M.M.A.A. (ed.) OPODIS 2006. Springer, Heidelberg
    • Gilbert, S., Guerraoui, R., Newport, C.: Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In: Shvartsman, M.M.A.A. (ed.) OPODIS 2006. LNCS, vol. 4305, pp. 215-229. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4305 , pp. 215-229
    • Gilbert, S.1    Guerraoui, R.2    Newport, C.3
  • 18
    • 0001153669 scopus 로고    scopus 로고
    • Analysis of backoff protocols for mulitiple accesschannels
    • Hastad, J., Leighton, T., Rogoff, B.: Analysis of backoff protocols for mulitiple accesschannels. SIAM Journal on Computing 25(4) (1996)
    • (1996) SIAM Journal on Computing , vol.25 , Issue.4
    • Hastad, J.1    Leighton, T.2    Rogoff, B.3
  • 19
    • 33745874728 scopus 로고    scopus 로고
    • Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless lans
    • Heusse, M., Rousseau, F., Guillier, R., Duda, A.: Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless lans. In: Proc. SIGCOMM (2005)
    • Proc. SIGCOMM (2005)
    • Heusse, M.1    Rousseau, F.2    Guillier, R.3    Duda, A.4
  • 23
  • 24
    • 35048853559 scopus 로고    scopus 로고
    • Radio network clustering from scratch
    • Albers, S., Radzik, T. (eds.) ESA 2004. Springer, Heidelberg
    • Kuhn, F., Moscibroda, T.,Wattenhofer, R.: Radio network clustering from scratch. In: Albers, S., Radzik, T. (eds.) ESA 2004. LNCS, vol. 3221, Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3221
    • Kuhn, F.1    Moscibroda, T.2    Wattenhofer, R.3
  • 26
    • 33745949686 scopus 로고    scopus 로고
    • Energy-efficient linklayer jamming attacks against wireless sensor network mac protocols
    • Law, Y., van Hoesel, L., Doumen, J., Hartel, P., Havinga, P.: Energy-efficient linklayer jamming attacks against wireless sensor network mac protocols. In: Proc. of SASN '05, pp. 76-88 (2005)
    • (2005) Proc. of SASN '05 , pp. 76-88
    • Law, Y.1    Van Hoesel, L.2    Doumen, J.3    Hartel, P.4    Havinga, P.5
  • 27
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and network defense policies in wireless sensor networks
    • Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attacks and network defense policies in wireless sensor networks. In: Proc. of Infocom '07, pp. 1307-1315 (2007)
    • (2007) Proc. of Infocom '07 , pp. 1307-1315
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 28
    • 34548295754 scopus 로고    scopus 로고
    • Spread: Foiling smart jammers using multi-layer agility
    • Liu, X., Noubir, G., Sundaram, R., Tan, S.: Spread: Foiling smart jammers using multi-layer agility. In: Proc. of Infocom '07, pp. 2536-2540 (2007)
    • (2007) Proc. of Infocom '07 , pp. 2536-2540
    • Liu, X.1    Noubir, G.2    Sundaram, R.3    Tan, S.4
  • 29
    • 68749121136 scopus 로고    scopus 로고
    • Speed dating despite jammers
    • Krishnamachari, B., Suri, S., Heinzelman, W., Mitra, U. (eds.) DCOSS 2009. Springer, Heidelberg
    • Meier, D., Pignolet, Y.A., Schmid, S., Wattenhofer, R.: Speed dating despite jammers. In: Krishnamachari, B., Suri, S., Heinzelman, W., Mitra, U. (eds.) DCOSS 2009. LNCS, vol. 5516, Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5516
    • Meier, D.1    Pignolet, Y.A.2    Schmid, S.3    Wattenhofer, R.4
  • 30
    • 34548307187 scopus 로고    scopus 로고
    • Using channel hopping to increase 802.11 resilience to jamming attacks
    • Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using channel hopping to increase 802.11 resilience to jamming attacks. In: Proc. of Infocom '07, pp. 2526-2530 (2007)
    • (2007) Proc. of Infocom '07 , pp. 2526-2530
    • Navda, V.1    Bohra, A.2    Ganguly, S.3    Rubenstein, D.4
  • 32
    • 33745943760 scopus 로고    scopus 로고
    • On connectivity in ad hoc networks under jamming using directional antennas and mobility
    • Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds.) WWIC 2004. Springer, Heidelberg
    • Noubir, G.: On connectivity in ad hoc networks under jamming using directional antennas and mobility. In: Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds.) WWIC 2004. LNCS, vol. 2957, pp. 186-200. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2957 , pp. 186-200
    • Noubir, G.1
  • 33
    • 57549114031 scopus 로고    scopus 로고
    • Feasibility and complexity of broadcasting with random transmission failures
    • Pelc, A., Peleg, D.: Feasibility and complexity of broadcasting with random transmission failures. In: Proc. of PODC '05 (2005)
    • (2005) Proc. of PODC '05
    • Pelc, A.1    Peleg, D.2
  • 34
    • 0032107964 scopus 로고    scopus 로고
    • Stochastic contention resolution with short delays
    • Raghavan, P., Upfal, E.: Stochastic contention resolution with short delays. SIAM Journal on Computing 28(2), 709-719 (1999)
    • (1999) SIAM Journal on Computing , vol.28 , Issue.2 , pp. 709-719
    • Raghavan, P.1    Upfal, E.2
  • 35
    • 0001595705 scopus 로고
    • Chernoff-Hoeffding bounds for applications with limited independence
    • Schmidt, J., Siegel, A., Srinivasan, A.: Chernoff-Hoeffding bounds for applications with limited independence. SIAM Journal on Discrete Mathematics 8(2), 223-250 (1995)
    • (1995) SIAM Journal on Discrete Mathematics , vol.8 , Issue.2 , pp. 223-250
    • Schmidt, J.1    Siegel, A.2    Srinivasan, A.3
  • 37
    • 34548311320 scopus 로고    scopus 로고
    • Intelligent jamming in wireless networks with applications to 802.11b and other networks
    • Thuente, D., Acharya, M.: Intelligent jamming in wireless networks with applications to 802.11b and other networks. In: Proc. of MILCOM '06 (2006)
    • (2006) Proc. of MILCOM '06
    • Thuente, D.1    Acharya, M.2
  • 38
    • 45749134626 scopus 로고    scopus 로고
    • DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks
    • Wood, A., Stankovic, J., Zhou, G.: DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: Proc. of SECON '07 (2007)
    • (2007) Proc. of SECON '07
    • Wood, A.1    Stankovic, J.2    Zhou, G.3
  • 39
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • DOI 10.1109/MNET.2006.1637931
    • Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Network 20(3), 41-47 (2006) (Pubitemid 43885286)
    • (2006) IEEE Network , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 40
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proc. of MobiHoc '05, pp. 46-57 (2005)
    • (2005) Proc. of MobiHoc '05 , pp. 46-57
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 43
    • 13244275115 scopus 로고    scopus 로고
    • A jamming-based MAC protocol to improve the performance of wireless multihop ad-hoc networks
    • Ye, S.-R., Wang, Y.-C., Tseng, Y.-C.: A jamming-based MAC protocol to improve the performance of wireless multihop ad-hoc networks.Wirel. Commun. Mob. Comput. 4(1), 75-84 (2004)
    • (2004) Wirel. Commun. Mob. Comput. , vol.4 , Issue.1 , pp. 75-84
    • Ye, S.-R.1    Wang, Y.-C.2    Tseng, Y.-C.3
  • 44
    • 0026240492 scopus 로고
    • Jamming in slotted ALOHA multihop packed radio networks
    • Zander, J.: Jamming in slotted ALOHA multihop packed radio networks. IEEE Transactions on Networking 39(10), 1525-1531 (1991)
    • (1991) IEEE Transactions on Networking , vol.39 , Issue.10 , pp. 1525-1531
    • Zander, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.