메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1871-1879

From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK DETECTION; COMMUNICATION TRAFFICS; CONVENTIONAL MODELS; E-HEALTHCARE; NETWORK SYSTEMS; REAL-TIME EXPERIMENT; SMART GRID; TIME-CRITICAL APPLICATIONS; TIME-CRITICAL MESSAGES; TRANSITION PHENOMENON; WIRELESS APPLICATION; WIRELESS CHANNEL;

EID: 79960859827     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5934989     Document Type: Conference Paper
Times cited : (60)

References (25)
  • 1
    • 67349144635 scopus 로고    scopus 로고
    • Battery-dynamics driven TDMA MAC protocols for wireless body-area monitoring networks in healthcare applications
    • May
    • H. Su and X. Zhang, "Battery-dynamics driven TDMA MAC protocols for wireless body-area monitoring networks in healthcare applications," IEEE J. Select. Areas in Commun., vol. 27, pp. 424-434, May 2009.
    • (2009) IEEE J. Select. Areas in Commun. , vol.27 , pp. 424-434
    • Su, H.1    Zhang, X.2
  • 2
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • Feb.
    • M. Li, W. Lou, and K. Ren, "Data security and privacy in wireless body area networks," IEEE Wireless Commun., vol. 17, pp. 51-58, Feb. 2010.
    • (2010) IEEE Wireless Commun. , vol.17 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3
  • 3
    • 72449191827 scopus 로고    scopus 로고
    • NIST framework and roadmap for smart grid interoperability standards, release 1.0
    • Office of the National Coordinator for Smart Grid Interoperability
    • Office of the National Coordinator for Smart Grid Interoperability, "NIST framework and roadmap for smart grid interoperability standards, release 1.0," NIST Special Publication 1108, 2009.
    • (2009) NIST Special Publication , vol.1108
  • 8
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. of ACM MobiHoc '05, 2005, pp. 46-57.
    • (2005) Proc. of ACM MobiHoc '05 , pp. 46-57
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 11
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and network defense policies in wireless sensor networks
    • May
    • M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks," in Proc. Of IEEE INFOCOM'07, May 2007, pp. 1307-1315.
    • (2007) Proc. of IEEE INFOCOM'07 , pp. 1307-1315
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 12
    • 49549091088 scopus 로고    scopus 로고
    • Robust detection of MAC layer denialof-service attacks in CSMA/CA wireless networks
    • Sept.
    • A. L. Toledo and X. Wang, "Robust detection of MAC layer denialof-service attacks in CSMA/CA wireless networks," IEEE Trans. Info. Forensics and Security, vol. 3, pp. 347-358, Sept. 2008.
    • (2008) IEEE Trans. Info. Forensics and Security , vol.3 , pp. 347-358
    • Toledo, A.L.1    Wang, X.2
  • 14
    • 70450192514 scopus 로고    scopus 로고
    • Efficient uncoordinated FHSS anti-jamming communication
    • M. Strasser, C. Popper, and S. Capkun, "Efficient uncoordinated FHSS anti-jamming communication," in Proc. of MobiHoc '09, 2009.
    • (2009) Proc. of MobiHoc ' , vol.9
    • Strasser, M.1    Popper, C.2    Capkun, S.3
  • 15
    • 51349125793 scopus 로고    scopus 로고
    • Dynamic jamming mitigation for wireless broadcast networks
    • Apr.
    • J. T. Chiang and Y.-C. Hu, "Dynamic jamming mitigation for wireless broadcast networks," in Proc. of IEEE INFOCOM '08, Apr. 2008.
    • (2008) Proc. of IEEE INFOCOM '08
    • Chiang, J.T.1    Hu, Y.-C.2
  • 16
    • 34548307187 scopus 로고    scopus 로고
    • Using channel hopping to increase 802.11 resilience to jamming attacks
    • May
    • V. Navda, A. Bohra, S. Ganguly, and D. Rubenstein, "Using channel hopping to increase 802.11 resilience to jamming attacks," in Proc. Of IEEE INFOCOM '07, May 2007, pp. 2526-2530.
    • (2007) Proc. of IEEE INFOCOM '07 , pp. 2526-2530
    • Navda, V.1    Bohra, A.2    Ganguly, S.3    Rubenstein, D.4
  • 17
    • 77953306472 scopus 로고    scopus 로고
    • Randomized differential DSSS: Jamming-resistant wireless broadcast communication
    • Mar.
    • Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized differential DSSS: Jamming-resistant wireless broadcast communication," in Proc. of IEEE INFOCOM '10, Mar. 2010.
    • (2010) Proc. of IEEE INFOCOM '10
    • Liu, Y.1    Ning, P.2    Dai, H.3    Liu, A.4
  • 19
    • 33845635202 scopus 로고    scopus 로고
    • Wormhole-based antijamming techniques in sensor networks
    • Jan.
    • M. Cagalj, S. Capkun, and J. P. Hubaux, "Wormhole-based antijamming techniques in sensor networks," IEEE Trans. Mobile Computing, vol. 6, no. 1, pp. 100-114, Jan. 2007.
    • (2007) IEEE Trans. Mobile Computing , vol.6 , Issue.1 , pp. 100-114
    • Cagalj, M.1    Capkun, S.2    Hubaux, J.P.3
  • 20
    • 70449499500 scopus 로고    scopus 로고
    • Detection of jamming attacks in wireless ad hoc networks using error distribution
    • Jun.
    • A. Hamieh and J. Ben-Othman, "Detection of jamming attacks in wireless ad hoc networks using error distribution," in Proc. of IEEE ICC '09, Jun. 2009.
    • (2009) Proc. of IEEE ICC '09
    • Hamieh, A.1    Ben-Othman, J.2
  • 21
    • 33947546493 scopus 로고    scopus 로고
    • Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions
    • Feb.
    • D. Malone, K. Duffy, and D. Leith, "Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions," IEEE/ACM Trans. Networking, vol. 15, pp. 159-172, Feb. 2007.
    • (2007) IEEE/ACM Trans. Networking , vol.15 , pp. 159-172
    • Malone, D.1    Duffy, K.2    Leith, D.3
  • 23
    • 50149105732 scopus 로고    scopus 로고
    • Impact of denial of service attacks on ad hoc networks
    • Aug.
    • I. Aad, J.-P. Hubaux, and E. W. Knightly, "Impact of denial of service attacks on ad hoc networks," IEEE Trans. Networking, vol. 16, no. 4, pp. 791-802, Aug. 2008.
    • (2008) IEEE Trans. Networking , vol.16 , Issue.4 , pp. 791-802
    • Aad, I.1    Hubaux, J.-P.2    Knightly, E.W.3
  • 24
    • 79960852530 scopus 로고    scopus 로고
    • Madwifi, http://madwifi.org.
  • 25
    • 54049105545 scopus 로고    scopus 로고
    • Modelling and simulation for performance evaluation of IEC61850-based substation communication systems
    • July
    • T. S. Sidhu and Y. Yin, "Modelling and simulation for performance evaluation of IEC61850-based substation communication systems," IEEE Trans. Power Delivery, vol. 22, no. 3, pp. 1482-1489, July 2007.
    • (2007) IEEE Trans. Power Delivery , vol.22 , Issue.3 , pp. 1482-1489
    • Sidhu, T.S.1    Yin, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.