메뉴 건너뛰기




Volumn 19, Issue 1, 2011, Pages 286-298

Cross-layer jamming detection and mitigation in wireless broadcast networks

Author keywords

Broadcast networks; jamming mitigation; spread spectrum

Indexed keywords

BROADCAST NETWORKS; CROSS-LAYER; EVENT DRIVEN; FINITE NUMBER; HIGH PROBABILITY; JAMMERS; JAMMING MITIGATION; MATLAB SIMULATIONS; PHYSICAL FACTORS; PHYSICAL LAYERS; POWER EFFICIENT; SPREAD SPECTRUM; SPREADING CODES; TRANSMITTED SIGNAL; WIRELESS BROADCAST NETWORKS; WIRELESS COMMUNICATION SYSTEM;

EID: 79951949189     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2010.2068576     Document Type: Article
Times cited : (73)

References (23)
  • 1
    • 37749010823 scopus 로고    scopus 로고
    • Cross-layer jamming detection and mitigation in wireless broadcast networks
    • Montréal, QC, Canada
    • J. T. Chiang and Y.-C. Hu, "Cross-layer jamming detection and mitigation in wireless broadcast networks," in Proc. 13th Annu. ACM Mo-biCom, Montréal, QC, Canada, 2007, pp. 346-349.
    • (2007) Proc. 13th Annu. ACM Mo-biCom , pp. 346-349
    • Chiang, J.T.1    Hu, Y.-C.2
  • 2
    • 51349125793 scopus 로고    scopus 로고
    • Dynamic jamming mitigation for wireless broadcast networks
    • Phoenix, AZ, Apr.
    • J. T. Chiang and Y.-C. Hu, "Dynamic jamming mitigation for wireless broadcast networks," in Proc. 27th IEEE INFOCOM, Phoenix, AZ, Apr. 2008, pp. 1211-1219.
    • (2008) Proc. 27th IEEE INFOCOM , pp. 1211-1219
    • Chiang, J.T.1    Hu, Y.-C.2
  • 3
    • 0020128340 scopus 로고
    • Theory of spread spectrum communications-A tutorial
    • May
    • R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, "Theory of spread spectrum communications-A tutorial," IEEE Trans. Commun., vol. COM-30, no. 5, pt. 2, pp. 855-884, May 1982.
    • (1982) IEEE Trans. Commun. , vol.COM-30 , Issue.5 PART 2 , pp. 855-884
    • Pickholtz, R.L.1    Schilling, D.L.2    Milstein, L.B.3
  • 4
    • 0042433239 scopus 로고    scopus 로고
    • Power control and clustering in ad hoc networks
    • San Francisco, CA, Mar.
    • V. Kawadia and P. R. Kumar, "Power control and clustering in ad hoc networks," in Proc. IEEE INFOCOM, San Francisco, CA, Mar. 2003, vol. 1, pp. 459-469.
    • (2003) Proc. IEEE INFOCOM , vol.1 , pp. 459-469
    • Kawadia, V.1    Kumar, P.R.2
  • 5
    • 33847420872 scopus 로고    scopus 로고
    • Physical layer built-in security analysis and enhancement of CDMA systems
    • Atlantic City, NJ, Oct.
    • T. Li,J.Ren, Q. Ling, and A. Jain, "Physical layer built-in security analysis and enhancement of CDMA systems," in Proc. IEEE MILCOM, Atlantic City, NJ, Oct. 2005, pp. 956-962.
    • (2005) Proc. IEEE MILCOM , pp. 956-962
    • Lijren, T.1    Ling, Q.2    Jain, A.3
  • 6
    • 79951949948 scopus 로고    scopus 로고
    • Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standard 802.11-1997, IEEE Computer Society LAN MAN Standards Committee, 1997
    • Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standard 802.11-1997, IEEE Computer Society LAN MAN Standards Committee, 1997.
  • 7
    • 64149093709 scopus 로고
    • Overview of the technical basis of Qualcomm's CDMA cellular telephone system design: A view of North American TIA/EIA IS-95
    • Singapore, Nov.
    • J. S. Lee, "Overview of the technical basis of Qualcomm's CDMA cellular telephone system design: A view of North American TIA/EIA IS-95," in Proc. 9th IEEE ICCS, Singapore, Nov. 1994, vol. 2, pp. 353-358.
    • (1994) Proc. 9th IEEE ICCS , vol.2 , pp. 353-358
    • Lee, J.S.1
  • 10
    • 84936895973 scopus 로고
    • Adaptive antenna systems
    • Dec.
    • B. Widrow, P. Mantey, L. Griffiths, and B. Goode, "Adaptive antenna systems," Proc. IEEE, vol. 55, no. 12, pp. 2143-2159, Dec. 1967.
    • (1967) Proc. IEEE , vol.55 , Issue.12 , pp. 2143-2159
    • Widrow, B.1    Mantey, P.2    Griffiths, L.3    Goode, B.4
  • 11
    • 79951666344 scopus 로고    scopus 로고
    • The use of concurrent codes in computer programming and digital signal processing education
    • W. Bahn, L. Baird, and M. Collins, "The use of concurrent codes in computer programming and digital signal processing education," J. Comput. Sci. Colleges, vol. 23, no. 1, pp. 174-180, 2007.
    • (2007) J. Comput. Sci. Colleges , vol.23 , Issue.1 , pp. 174-180
    • Bahn, W.1    Baird, L.2    Collins, M.3
  • 12
    • 50249175122 scopus 로고    scopus 로고
    • Jamming-resistant key establishment using uncoordinated frequency hopping
    • Berkley, CA, May
    • M. Strasser, S. Capkun, C. Pöpper, and M. Cagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE Symp. Security Privacy, Berkley, CA, May 2008, pp. 64-78.
    • (2008) Proc. IEEE Symp. Security Privacy , pp. 64-78
    • Strasser, M.1    Capkun, S.2    Pöpper, C.3    Cagalj, M.4
  • 13
    • 77953998228 scopus 로고    scopus 로고
    • Zero pre-shared secret key establishment in the presence of jammers
    • New Orleans, LA
    • T. Jin, G. Noubir, and B. Thapa, "Zero pre-shared secret key establishment in the presence of jammers," in Proc. 10th ACM MobiHoc, New Orleans, LA, 2009, pp. 219-228.
    • (2009) Proc. 10th ACM MobiHoc , pp. 219-228
    • Jin, T.1    Noubir, G.2    Thapa, B.3
  • 14
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • R. C. Merkle, "Secure communications over insecure channels," Commun. ACM, vol. 21, no. 4, pp. 294-299, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.C.1
  • 15
    • 0017930809 scopus 로고
    • METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS
    • DOI 10.1145/359340.359342
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 16
    • 0018443381 scopus 로고
    • Privacy and authentication: An introduction to cryptography
    • Mar.
    • W. Diffie and M. E. Hellman, "Privacy and authentication: An introduction to cryptography," Proc. IEEE, vol. 67, no. 3, pp. 397-427, Mar. 1979.
    • (1979) Proc. IEEE , vol.67 , Issue.3 , pp. 397-427
    • Diffie, W.1    Hellman, M.E.2
  • 17
  • 21
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • DOI 10.1109/90.836475
    • C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. Netw., vol. 8, no. 1, pp. 16-30, Feb. 2000. (Pubitemid 30584705)
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 23
    • 0003593243 scopus 로고    scopus 로고
    • Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications IEEE Std 802.11a-1999, IEEE Computer Society LAN MAN Standards Committee
    • Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, High-Speed Physical Layer in the 5 GHz Band, IEEE Std 802.11a-1999, IEEE Computer Society LAN MAN Standards Committee, 1999.
    • (1999) High-Speed Physical Layer in the 5 GHz Band


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.