-
1
-
-
0142199497
-
Modeling of distributed denial of service attacks in wireless networks
-
Q. Huang, H. Kobayashi, and B. Liu. "Modeling of distributed denial of service attacks in wireless networks," in IEEE Pacific Rim Conf. Commun., Computers and Signal Process., vol. 1, pp. 113-127, 2003.
-
(2003)
IEEE Pacific Rim Conf. Commun., Computers and Signal Process.
, vol.1
, pp. 113-127
-
-
Huang, Q.1
Kobayashi, H.2
Liu, B.3
-
3
-
-
84885887963
-
-
[Online]. Available
-
SESP jammers. [Online]. Available: http://www.sesp.com/.
-
SESP Jammers
-
-
-
4
-
-
80051781500
-
-
[Online]. Available
-
ISM Wide Band Jammers. [Online]. Available: http://69.6.206.229/e- commerce-solutions-catalog1.0.4.html.
-
ISM Wide Band Jammers
-
-
-
6
-
-
80052034261
-
-
[Online] Available
-
Mobile Device Jammer. [Online]. Available: http://www.phonejammer. com/home.php
-
Mobile Device Jammer
-
-
-
7
-
-
80052036756
-
-
[Online] Available
-
"Jamming attack in Hackers' Conf.," [Online]. Available: http://findarticles.com/p/articles/mi\-m0EIN/is\-2005\-August\-2/ai\-n14841565.
-
Jamming Attack in Hackers' Conf
-
-
-
8
-
-
80051787666
-
-
[Online]. Available
-
Techworld news. [Online]. Available: http://www.techworld.com/mobility/ news/index.cfm?newsid=10941.
-
Techworld News
-
-
-
9
-
-
77951537189
-
-
[Online]. Available
-
RF Jamming attack. [Online]. Available: http://manageengine.adventnet. com/products/wifi-manager/rfjamming-attack.html.
-
RF Jamming Attack
-
-
-
10
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," MobiHoc 05, May 25-27, 2005, Urbana-Champaign, Illinois, USA, pp 46-57. (Pubitemid 43037582)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
11
-
-
49049121983
-
Intelligent jamming attacks, counterattacks and (counter)2 attacks in 802.11b wireless networks
-
Washington DC, USA, Aug.
-
M. Acharya and D. Thuente, "Intelligent jamming attacks, counterattacks and (counter)2 attacks in 802.11b wireless networks," in Proc. OPNETWORK-2005 Conf., Washington DC, USA, Aug. 2005.
-
(2005)
Proc. OPNETWORK-2005 Conf
-
-
Acharya, M.1
Thuente, D.2
-
12
-
-
79961204213
-
On connectivity in ad hoc networks under jamming using directional antennas and mobility
-
Dec.
-
G.Noubir, "On connectivity in ad hoc networks under jamming using directional antennas and mobility," Technical Report, Dec. 2003.
-
(2003)
Technical Report
-
-
Noubir, G.1
-
14
-
-
33745062882
-
Jamming sensor networks: Attacks and defense strategies
-
May/June
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming sensor networks: Attacks and defense strategies," in IEEE Netw., May/June 2006.
-
(2006)
IEEE Netw
-
-
Xu, W.1
A, K.M.2
Trappe, W.3
Zhang, Y.4
-
16
-
-
0036793924
-
Denial of service in sensor networks
-
Oct.
-
A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Comp., vol. 35, no. 10, Oct. 2002, pp. 5462.
-
(2002)
IEEE Comp.
, vol.35
, Issue.10
, pp. 5462
-
-
Wood, A.1
Stankovic, J.2
-
17
-
-
29844445404
-
Low power DoS attacks in data wireless LANs and countermeasures
-
Annapolis, MD: ACM Press
-
G.Noubir and G.Lin, "Low power DoS attacks in data wireless LANs and countermeasures," in Proc. Poster: ACM MobiHoc 2003. Annapolis, MD: ACM Press.
-
(2003)
Proc. Poster: ACM MobiHoc
-
-
Noubir, G.1
Lin, G.2
-
18
-
-
80052021809
-
Jamming and sensing of encrypted wireless ad hoc networks
-
May, Florence, Italy
-
T.X.Brown, J.E.James, and A.Sethi, "Jamming and sensing of encrypted wireless ad hoc networks," in MobiHoc06, 22-25 May, Florence, Italy.
-
Mobi Hoc
, vol.6
, pp. 22-25
-
-
Brown, T.X.1
James, J.E.2
Sethi, S.3
-
20
-
-
36949015142
-
Understanding and mitigating the impact of RF interference on 802.11 networks
-
R. Gummadi, D. Wetheral, B. Greenstein, and S. Seshan, "Understanding and mitigating the impact of RF interference on 802.11 networks," in ACM SIGCOMM, 2007.
-
(2007)
ACM SIGCOMM
-
-
Gummadi, R.1
Wetheral, D.2
Greenstein, B.3
Seshan, S.4
-
22
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Aug.
-
J.Bellardo and S.Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proc. USENIX Security Sympo-sium03, Aug. 03.
-
Proc. USENIX Security Sympo-sium03
, vol.3
-
-
Bellardo, J.1
Savage, S.2
-
23
-
-
80052025989
-
DOMINO: Detecting MAC layer greedy behavior in
-
Boston (MA), USA
-
M.Raya, I.Aad, J-P.Hubaux, and A. El Fawal, "DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots," in Proc. ACM MobiSys, Boston (MA), USA, 2004.
-
(2004)
IEEE 802.11 Hotspots, Proc. ACM MobiSys
-
-
Raya, M.1
Aad, I.2
Hubaux, J.-P.3
Fawal, A.E.4
-
25
-
-
85008044268
-
Selfish MAC layer misbehavior in wireless networks
-
Sept./Oct.
-
P.Kyasanur and N.Vaidya, "Selfish MAC layer misbehavior in wireless networks," in IEEE Trans. Mobile Comput., vol. 4, no. 5, Sept./Oct. 2005.
-
(2005)
IEEE Trans. Mobile Comput.
, vol.4
, Issue.5
-
-
Kyasanur, P.1
Vaidya, N.2
-
28
-
-
34548314598
-
Optimal jamming attacks and network defenses policies in wireless sensor networks
-
M. Li, I. Koutsopoulos, and R. Pooverdan, "Optimal jamming attacks and network defenses policies in wireless sensor networks," in Proc. IEEE INFOCOM 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Li, M.1
Koutsopoulos, I.2
Pooverdan, R.3
-
30
-
-
34548349362
-
Interference mitigation through power control in high density 802.11 WLANs
-
V. P. Mhatre, K. Papagiannaki, and F. Baccelli, "Interference mitigation through power control in high density 802.11 WLANs," in IEEE INFOCOM 2007.
-
(2007)
IEEE INFOCOM
-
-
Mhatre, V.P.1
Papagiannaki, K.2
Baccelli, F.3
-
31
-
-
33749037166
-
A framework for MAC protocol misbehavior detection in wireless networks
-
S. Radosavac, J. S. Barras, and I. Koutsopoulos, "A framework for MAC protocol misbehavior detection in wireless networks," in ACM WiSe, 2005.
-
(2005)
ACM WiSe
-
-
Radosavac, S.1
Barras, J.S.2
Koutsopoulos, I.3
-
33
-
-
47049121757
-
Data fusion algorithms for network anomaly detection: Classification and evaluation
-
Athens, Greece
-
V.Chatzigiannakis, G. Androulidakis, K. Pelechrinis, S. Papavassiliou, and V. Maglaris, "Data fusion algorithms for network anomaly detection: classification and evaluation," in ICNS 2007, Athens, Greece.
-
(2007)
ICNS
-
-
Chatzigiannakis, V.1
Androulidakis, G.2
Pelechrinis, K.3
Papavassiliou, S.4
Maglaris, V.5
-
34
-
-
85087999457
-
Intrusion detection in wireless ad hoc networks
-
Boston, MA
-
Y.Zhang and W.Lee, "Intrusion detection in wireless ad hoc networks," in ACM MobiCom 00, Boston, MA.
-
ACM MobiCom 00
-
-
Zhang, Y.1
Lee, W.2
-
35
-
-
0035178273
-
Security enhancements in AODV protocol for wireless ad hoc networks
-
Fall Oct. 7-11, 2001
-
S.Bhargava and D.P.Agrawal, "Security enhancements in AODV protocol for wireless ad hoc networks," in VTC 2001 Fall, vol. 4, Oct. 7-11, 2001.
-
(2001)
VTC
, vol.4
-
-
Bhargava, S.1
Agrawal, D.P.2
-
36
-
-
21644434924
-
Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches
-
Syst., Ciudad Real, Spain. Apr. 3-6
-
P.Albers et al. "Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches," in 1st International Workshop Wireless Info., Syst., Ciudad Real, Spain, Apr. 3-6, 2002.
-
(2002)
1st International Workshop Wireless Info
-
-
Albers, P.1
-
37
-
-
4143084830
-
SVM-based intrusion detection system for wireless ad hoc networks
-
H.Deng, Q-A.Zeng, and D.P.Agrawal, "SVM-based intrusion detection system for wireless ad hoc networks," in VTC, 2003.
-
(2003)
VTC
-
-
Deng, H.1
Zeng, Q.-A.2
Agrawal, D.P.3
-
38
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
Sept.
-
Y.Zhang, W.Lee, and Y.-A.Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," in ACM J. Wireless Net., vol. 9, no. 5, Sept. 2003, pp. 545-56.
-
(2003)
ACM. J. Wireless Net.
, vol.9
, Issue.5
, pp. 545-56
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
-
39
-
-
34547238643
-
An examination of an intrusion detection architecture for wireless ad hoc networks
-
May
-
A.B.Smith, "An examination of an intrusion detection architecture for wireless ad hoc networks," in 5th National. Colloq. Inf. Syst. Sec. Education, May 2001.
-
(2001)
5th National. Colloq. Inf. Syst. Sec. Education
-
-
Smith, A.B.1
-
40
-
-
84950162203
-
Intrusion detection using mobile agents in wireless ad hoc networks
-
July 10-12
-
O.Kachirski and R.Guha, "Intrusion detection using mobile agents in wireless ad hoc networks," in Knowledge Media Net., Proc. IEEE Wksp., July 10-12, 2002, pp. 153-58.
-
(2002)
Knowledge Media Net. Proc. IEEE Wksp
, pp. 153-58
-
-
Kachirski, O.1
Guha, R.2
-
41
-
-
11244260535
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
W.Xu et al, "Channel surfing and spatial retreats: Defenses against wireless denial of service," in Proc. 2004 ACM Wksp. Wireless Security, 2004, pp.80-89.
-
(2004)
Proc. 2004 ACM Wksp. Wireless Security
, pp. 80-89
-
-
Xu, W.1
-
42
-
-
34548307187
-
Using channel hopping to increase 802.11 resilience to jamming attacks
-
V. Navda, A. Bohra, S. Ganguly, and D. Rubenstein, "Using channel hopping to increase 802.11 resilience to jamming attacks," in IEEE INFOCOM, Mini-Conf., 2007.
-
(2007)
IEEE INFOCOM, Mini-Conf.
-
-
Navda, V.1
Bohra, A.2
Ganguly, S.3
Rubenstein, D.4
-
44
-
-
63249105839
-
Multi-channel jamming attachs using cognitive radios
-
A. Sampath, H. Dai, H. Zheng, and B. Y. Zhao, "Multi-channel jamming attachs using cognitive radios," in IEEE ICCCN, 2007.
-
(2007)
IEEE ICCCN
-
-
Sampath, A.1
Dai, H.2
Zheng, H.3
Zhao, B.Y.4
-
46
-
-
24144449882
-
DoS analysis of reservation based MAC protocols
-
R.Negi and A.Rajeswaran, "DoS analysis of reservation based MAC protocols," in ICC, 2005.
-
(2005)
ICC
-
-
Negi, R.1
Rajeswaran, A.2
-
47
-
-
29844445404
-
Poster: Low-power DoS attacks in data wireless LANs and countermeasures
-
June Annapolis MD, USA
-
G.Noubir and G.Lin, "Poster: Low-power DoS attacks in data wireless LANs and countermeasures," in MobiHoc 03, June 1-3, Annapolis, MD, USA.
-
MobiHoc 03
, pp. 1-3
-
-
Noubir, G.1
Lin, G.2
-
48
-
-
76749100175
-
On link layer denial of service in data wireless LANs
-
May
-
G.Lin and G.Noubir, "On link layer denial of service in data wireless LANs," Wireless Commun. Mobile Comput., May 2003.
-
(2003)
Wireless Commun. Mobile Comput
-
-
Lin, G.1
Noubir, G.2
-
51
-
-
56749150049
-
Anti-jamming timing channels for wireless networks
-
W. Xu, W. Trappe, and Y. Zhang, "Anti-jamming timing channels for wireless networks," in ACM WiSec 2008.
-
(2008)
ACM WiSec
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
52
-
-
0024666733
-
Optical orthogonal codes: Design, analysis and applications
-
F. Chung, J. Salehi, and V.Wei, "Optical orthogonal codes: design, analysis and applications," IEEE Trans. Inf. Theory, 1989.
-
(1989)
IEEE Trans. Inf. Theory
-
-
Chung, F.1
Salehi, J.2
Wei, V.3
-
53
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks," in INFOCOM, 2003.
-
(2003)
INFOCOM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
55
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B. Levine, C Shields, and E. Belding-Royer, "A secure routing protocol for ad hoc networks," in ICNP, 2002, pp.78-89.
-
(2002)
ICNP
, pp. 78-89
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.3
Shields, C.4
Belding-Royer, E.5
-
57
-
-
34548295754
-
SPREAD: Foiling smart jammers using multi-layer agility
-
X. Liu, G. Noubir, R. Sundaram, and S. Tan, "SPREAD: Foiling smart jammers using multi-layer agility," in IEEE INFOCOM, Mini-Conf., 2007.
-
(2007)
IEEE INFOCOM, Mini-Conf.
-
-
Liu, X.1
Noubir, G.2
Sundaram, R.3
Tan, S.4
-
58
-
-
80051879293
-
FIJI: Fighting implicit jamming in 802.11 WLANs
-
I. Broustis, K. Pelechrinis, D. Syrivelis, S.V. Krishnamurthy and L. Tas-siulas, "FIJI: Fighting implicit jamming in 802.11 WLANs," SecureCom, 2009.
-
(2009)
SecureCom
-
-
Broustis, I.1
Pelechrinis, K.2
Syrivelis, D.3
Krishnamurthy, S.V.4
Tas-Siulas, L.5
-
60
-
-
70349107957
-
Jamming for good: A fresh approach to authentic communication in WSNs
-
I. Martinovic, P. Pichota, and J. B. Schmitt, "Jamming for good: A fresh approach to authentic communication in WSNs," ACM WiSec, 2009.
-
(2009)
ACM WiSec
-
-
Martinovic, I.1
Pichota, P.2
Schmitt, J.B.3
-
61
-
-
72949104155
-
A survey on jamming attacks and countermeasures in WSNs
-
A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, "A survey on jamming attacks and countermeasures in WSNs," IEEE Commun. Surveys Tuts., vol. 11, no. 4, 2009.
-
(2009)
IEEE Commun. Surveys Tuts.
, vol.11
, Issue.4
-
-
Mpitziopoulos, A.1
Gavalas, D.2
Konstantopoulos, C.3
Pantziou, G.4
-
62
-
-
67650844989
-
Sensor network security: A survey
-
Xiangqian Chen, Kia Makki, Kang Yen, and N. Pissinou, "Sensor network security: A survey," IEEE Commun. Surveys Tuts., vol. 11, no. 2, 2009.
-
(2009)
IEEE Commun. Surveys Tuts.
, vol.11
, Issue.2
-
-
Chen, X.1
Makki, K.2
Yen, K.3
Pissinou, N.4
-
63
-
-
70350692585
-
Securing wireless sensor networks: A survey
-
Y. Zhou, Y. Fang and Y. Zhang, "Securing wireless sensor networks: A survey," IEEE Commun. Surveys Tuts., vol. 10, no. 3, pp. 6-28, 2008.
-
(2008)
IEEE Commun. Surveys Tuts.
, vol.10
, Issue.3
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
-
64
-
-
70450164574
-
A survey of secure mobile ad hoc routing protocols
-
L. Abusalah, A. Khokhar and M. Guizani, "A survey of secure mobile ad hoc routing protocols," IEEE Commun. Surveys and Tutorials, Vol. 10, no. 4, pp. 78-93, 2008.
-
(2008)
IEEE Commun. Surveys and Tutorials
, vol.10
, Issue.4
, pp. 78-93
-
-
Abusalah, L.1
Khokhar, A.2
Guizani, M.3
-
65
-
-
54249101364
-
Surveying security analysis techniques in MANET routing protocols
-
T. R. Andel and A. Yasinsac, "Surveying security analysis techniques in MANET routing protocols," IEEE Commun. Surveys Tuts., vol. 9, no. 4, pp. 70-84, 2007.
-
(2007)
IEEE Commun. Surveys Tuts.
, vol.9
, Issue.4
, pp. 70-84
-
-
Andel, T.R.1
Yasinsac, A.2
-
66
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Y. Wang, G. Attebury and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Commun. Surveys Tuts., vol. 8, no. 2, pp. 2-23, 2006.
-
(2006)
IEEE Commun. Surveys Tuts.
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
67
-
-
34547610382
-
Secure routing for mobile ad hoc networks
-
P. G. Argyroudis and D. O'Mahony, "Secure routing for mobile ad hoc networks," IEEE Commun. Surveys Tuts., vol. 7, no. 3, pp. 2-21, 2005.
-
(2005)
IEEE Commun. Surveys Tuts.
, vol.7
, Issue.3
, pp. 2-21
-
-
Argyroudis, P.G.1
O'Mahony, D.2
-
68
-
-
33751027236
-
Component based channel assignment in single radio, multi-channel ad hoc networks
-
R. Vedantham, S. Kakumanu, S. Lakshmanan, and R. Sivakumar, "Component based channel assignment in single radio, multi-channel ad hoc networks," ACM MobiCom, 2006.
-
(2006)
ACM MobiCom
-
-
Vedantham, R.1
Kakumanu, S.2
Lakshmanan, S.3
Sivakumar, R.4
|