메뉴 건너뛰기




Volumn 28, Issue 5, 2010, Pages 703-715

Anti-jamming broadcast communication using uncoordinated spread spectrum techniques

Author keywords

Anti jamming; Broadcast; DSSS; Frequency Hopping; Spread Spectrum Communication; Wireless Security

Indexed keywords

ANTI-JAMMING; BROADCAST; DSSS; SPREAD SPECTRA; WIRELESS SECURITY;

EID: 79960882539     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2010.100608     Document Type: Article
Times cited : (199)

References (42)
  • 5
    • 85034799271 scopus 로고    scopus 로고
    • Jamming-resistant broadcast communication without shared keys
    • The USENIX Association
    • C. Pöpper, M. Strasser, and S. Čapkun, "Jamming- resistant broadcast communication without shared keys," in Proc. 18th USENIX Security Symposium, The USENIX Association, 2009.
    • (2009) Proc. 18th USENIX Security Symposium
    • Pöpper, C.1    Strasser, M.2    Čapkun, S.3
  • 8
    • 24144480841 scopus 로고    scopus 로고
    • Accumulators from bilinear pairings and applications
    • Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
    • L. Nguyen, "Accumulators from Bilinear Pairings and Applications," in Topics in Cryptology - CT-RSA, vol. 3376/2005 of Lecture Notes in Computer Science, pp. 275-292, Springer Berlin / Heidelberg, 2005. (Pubitemid 41231217)
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 275-292
    • Nguyen, L.1
  • 9
    • 84957360970 scopus 로고    scopus 로고
    • Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees
    • Advances in Cryptology - Eurocrypt '97
    • N. Bari and B. Pfitzmann, "Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees," in Advances in Cryptology EUROCRYPT, vol. 1233/1997 of Lecture Notes in Computer Science, pp. 480-494, Springer Berlin / Heidelberg, 1997. (Pubitemid 127067821)
    • (1997) Lecture Notes in Computer Science , Issue.1233 , pp. 480-494
    • Baric, N.1    Pfitzmann, B.2
  • 11
    • 28444495509 scopus 로고    scopus 로고
    • An evolutionary approach to designing complex spreading codes for DS-CDMA
    • DOI 10.1109/TWC.2005.853826
    • B. Natarajan, S. Das, and D. Stevens, "An evolutionary approach to designing complex spreading codes for DS-CDMA," IEEE Trans. Wireless Commun., vol. 4, no. 5, pp. 2051-2056, 2005. (Pubitemid 41729713)
    • (2005) IEEE Transactions on Wireless Communications , vol.4 , Issue.5 , pp. 2051-2056
    • Natarajan, B.1    Das, S.2    Stevens, D.3
  • 12
    • 0019021287 scopus 로고
    • Crosscorrelation properties of pseudorandom and related sequences
    • May
    • D. V. Sarwate and M. B. Pursley, "Crosscorrelation properties of pseudorandom and related sequences," in Proc. IEEE, vol. 68, pp. 593-619, May 1980.
    • (1980) Proc. IEEE , vol.68 , pp. 593-619
    • Sarwate, D.V.1    Pursley, M.B.2
  • 14
    • 84855469781 scopus 로고    scopus 로고
    • "GNU Radio Software." http://gnuradio.org/trac.
  • 16
    • 84855440565 scopus 로고    scopus 로고
    • U. Government, "Global positioning system." http://www.gps.gov, 2009.
    • (2009)
    • Government, U.1
  • 19
    • 25844454876 scopus 로고    scopus 로고
    • An asymmetric security mechanism for navigation signals
    • M. Kuhn, "An asymmetric security mechanism for navigation signals," in Proc. Information Hiding Workshop, 2004.
    • (2004) Proc. Information Hiding Workshop
    • Kuhn, M.1
  • 26
    • 33845635202 scopus 로고    scopus 로고
    • Wormhole-based antijamming techniques in sensor networks
    • DOI 10.1109/TMC.2007.250674
    • M. Čagalj, S. Čapkun, and J.-P. Hubaux, "Wormhole-based antijamming techniques in sensor networks," IEEE Trans. Mobile Comput., vol. 6, no. 1, pp. 100-114, 2007. (Pubitemid 44955817)
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.1 , pp. 100-114
    • Cagalj, M.1    Capkun, S.2    Hubaux, J.-P.3
  • 27
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • DOI 10.1109/MC.2002.1039518
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, pp. 54-62, Oct. 2002. (Pubitemid 35186161)
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 30
    • 29844445404 scopus 로고    scopus 로고
    • Low-power DoS attacks in data wireless LANs and countermeasures
    • G. Noubir and G. Lin, "Low-power DoS attacks in data wireless LANs and countermeasures," SIGMOBILE Mobile Computing and Communications Review, vol. 7, no. 3, pp. 29-30, 2003.
    • (2003) SIGMOBILE Mobile Computing and Communications Review , vol.7 , Issue.3 , pp. 29-30
    • Noubir, G.1    Lin, G.2
  • 34
    • 34247391971 scopus 로고    scopus 로고
    • Integrity regions: Authentication through presence in wireless networks
    • DOI 10.1145/1161289.1161291, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
    • S. Čapkun and M. Čagalj, "Integrity regions: authentication through presence in wireless networks," in Proc. 5th ACM workshop on Wireless Security (WiSe), pp. 1-10, 2006. (Pubitemid 46634296)
    • (2006) WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security , vol.2006 , pp. 1-10
    • Capkun, S.1    Cagalj, M.2
  • 35
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • C. Gehrmann, C. J. Mitchell, and K. Nyberg, "Manual authentication for wireless devices," RSA Cryptobytes, vol. 7, no. 1, 2004.
    • (2004) RSA Cryptobytes , vol.7 , Issue.1
    • Gehrmann, C.1    Mitchell, C.J.2    Nyberg, K.3
  • 42


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.