메뉴 건너뛰기




Volumn 6476 LNCS, Issue , 2010, Pages 140-154

Compromise-resilient anti-jamming for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ANTI-JAMMING; COMMUNICATION CHANNEL; COMMUNICATION OVERHEADS; COMPROMISED NODES; DENIAL OF SERVICE ATTACKS; GROUP KEY; NETWORK SETTINGS; PRACTICAL SOLUTIONS; RADIOFREQUENCY SIGNALS; RESOURCE-CONSTRAINED; WIRELESS TRANSMISSIONS; CONSTRAINED SENSORS; DENIAL OF SERVICE; PHYSICAL COMMUNICATIONS;

EID: 78650862556     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-17650-0_11     Document Type: Conference Paper
Times cited : (4)

References (32)
  • 4
    • 78751484765 scopus 로고    scopus 로고
    • Efficient Uncoordinated FHSS Anti-Jamming Communication
    • Strasser, M., Popper, C., Capkun, S.: Efficient Uncoordinated FHSS Anti-Jamming Communication. In: ACM Mobihoc (2009)
    • (2009) ACM Mobihoc
    • Strasser, M.1    Popper, C.2    Capkun, S.3
  • 6
    • 78650893161 scopus 로고    scopus 로고
    • Channel Surfing: Defending Wireless Sensor Networks from Jamming and Interference
    • Xu, W., Trappe, W., Zhang, Y.: Channel Surfing: Defending Wireless Sensor Networks from Jamming and Interference. In: ACM IPSN (2007)
    • (2007) ACM IPSN
    • Xu, W.1    Trappe, W.2    Zhang, Y.3
  • 7
    • 34548314598 scopus 로고    scopus 로고
    • Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks
    • Li, M., Koutsopoulos, I., Poovendran, R.: Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks. In: IEEE Infocom (2007)
    • (2007) IEEE Infocom
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 8
    • 33745966425 scopus 로고    scopus 로고
    • The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks
    • Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: ACM Mobihoc (2005)
    • (2005) ACM Mobihoc
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 11
    • 78650922429 scopus 로고    scopus 로고
    • Jamming and sensing of encrypted wireless ad hoc networks
    • Brown, T., James, J., Sethi, A.: Jamming and sensing of encrypted wireless ad hoc networks. In: ACM Mobihoc (2006)
    • (2006) ACM Mobihoc
    • Brown, T.1    James, J.2    Sethi, A.3
  • 12
    • 70349111445 scopus 로고    scopus 로고
    • Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks
    • Lazos, L., Liu, S., Krunz, M.: Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks. In: ACM WiSec (2009)
    • (2009) ACM WiSec
    • Lazos, L.1    Liu, S.2    Krunz, M.3
  • 14
    • 56749150049 scopus 로고    scopus 로고
    • AntiJamming Timing Channels for Wireless Networks
    • Xu, W., Trappe, W., Zhang, Y.: AntiJamming Timing Channels for Wireless Networks. In: ACM WiSec (2008)
    • (2008) ACM WiSec
    • Xu, W.1    Trappe, W.2    Zhang, Y.3
  • 17
    • 3042822764 scopus 로고    scopus 로고
    • Establishing Pairwise Keys in Distributed Sensor Networks
    • Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. In: ACM CCS (2003)
    • (2003) ACM CCS
    • Liu, D.1    Ning, P.2    Li, R.3
  • 18
    • 78650880763 scopus 로고    scopus 로고
    • LEAP+: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks
    • Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. In: ACM TOSN (2006)
    • (2006) ACM TOSN
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 19
    • 32144459886 scopus 로고    scopus 로고
    • TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
    • Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: ACM SenSys (2004)
    • (2004) ACM SenSys
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 21
    • 34548307187 scopus 로고    scopus 로고
    • Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks
    • Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks. In: IEEE Infocom (2007)
    • (2007) IEEE Infocom
    • Navda, V.1    Bohra, A.2    Ganguly, S.3    Rubenstein, D.4
  • 23
    • 84872950530 scopus 로고    scopus 로고
    • Tinyos homepage, http://webs.cs.berkeley.edu/tos/
    • Tinyos Homepage
  • 24
    • 78650892627 scopus 로고    scopus 로고
    • DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks
    • Wood, A., Stankovic, J., Zhou, G.: DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks. In: IEEE SECON (2007)
    • (2007) IEEE SECON
    • Wood, A.1    Stankovic, J.2    Zhou, G.3
  • 26
    • 70549106758 scopus 로고    scopus 로고
    • Transient-based identification of wireless sensor nodes
    • Danev, B., Capkun, S.: Transient-based identification of wireless sensor nodes. In: ACM/IEEE IPSN (2009)
    • (2009) ACM/IEEE IPSN
    • Danev, B.1    Capkun, S.2
  • 29
    • 33745736071 scopus 로고    scopus 로고
    • Remote software-based attestation for wireless sensors
    • Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. Springer, Heidelberg
    • Shaneck, M., Mahadevan, K., Kher, V., Kim, Y.: Remote software-based attestation for wireless sensors. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 27-41. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3813 , pp. 27-41
    • Shaneck, M.1    Mahadevan, K.2    Kher, V.3    Kim, Y.4
  • 30
    • 19944369062 scopus 로고    scopus 로고
    • Soft tamper-proofing via program integrity verification in wireless sensor networks
    • Park, T., Shin, K.G.: Soft tamper-proofing via program integrity verification in wireless sensor networks. IEEE Transactions on Mobile Computing (2005)
    • (2005) IEEE Transactions on Mobile Computing
    • Park, T.1    Shin, K.G.2
  • 31
    • 47249110641 scopus 로고    scopus 로고
    • Distributed softwarebased attestation for node compromise detection in sensor networks
    • Yang, Y., Wang, X., Zhu, S., Cao, G.: Distributed softwarebased attestation for node compromise detection in sensor networks. In: IEEE SRDS (2007)
    • (2007) IEEE SRDS
    • Yang, Y.1    Wang, X.2    Zhu, S.3    Cao, G.4
  • 32
    • 34547411877 scopus 로고    scopus 로고
    • A two-layer key establishment scheme for wireless sensor networks
    • Zhou, Y., Fang, Y.: A two-layer key establishment scheme for wireless sensor networks. IEEE Transactions on Mobile Computing (2007)
    • (2007) IEEE Transactions on Mobile Computing
    • Zhou, Y.1    Fang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.