-
1
-
-
51349091564
-
On the performance of IEEE 802.11 under jamming
-
Apr.
-
E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa. On the performance of IEEE 802.11 under jamming. In Proc. of IEEE INFOCOM, pages 1265-1273, Apr. 2008.
-
(2008)
Proc. of IEEE INFOCOM
, pp. 1265-1273
-
-
Bayraktaroglu, E.1
King, C.2
Liu, X.3
Noubir, G.4
Rajaraman, R.5
Thapa, B.6
-
2
-
-
79951949189
-
Cross-layer jamming detection and mitigation in wireless broadcast networks
-
Feb.
-
J. T. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Transactions on Networking, 19(1):286-298, Feb. 2011.
-
(2011)
IEEE/ACM Transactions on Networking
, vol.19
, Issue.1
, pp. 286-298
-
-
Chiang, J.T.1
Hu, Y.-C.2
-
3
-
-
77949462958
-
Understanding and mitigating the impact of RF interference on 802.11 networks
-
DOI 10.1145/1282380.1282424, ACM SIGCOMM 2007: Conference on Computer Communications
-
R. Gummadi, D. Wetherall, B. Greenstein, and S. Seshan. Understanding and mitigating the impact of RF interference on 802.11 networks. In Proc. of ACM SIGCOMM, pages 385-396, Aug. 2007. (Pubitemid 350239800)
-
(2007)
ACM SIGCOMM 2007: Conference on Computer Communications
, pp. 385-396
-
-
Gummadi, R.1
Wetherall, D.2
Greenstein, B.3
Seshan, S.4
-
5
-
-
60449113417
-
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
-
Feb.
-
Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Transactions on Sensor Networks, 5(1):6:1-38, Feb. 2009.
-
(2009)
ACM Transactions on Sensor Networks
, vol.5
, Issue.1-6
, pp. 1-38
-
-
Law, Y.W.1
Palaniswami, M.2
Hoesel, L.V.3
Doumen, J.4
Hartel, P.5
Havinga, P.6
-
6
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
DOI 10.1109/INFCOM.2007.155, 4215737, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
M. Li, I. Koutsopoulos, and R. Poovendran. Optimal jamming attacks and network defense policies in wireless sensor networks. In Proc. of IEEE INFOCOM, pages 1307-1315, May 2007. (Pubitemid 47334355)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1307-1315
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
7
-
-
18844450713
-
On link layer denial of service in data wireless LANs
-
DOI 10.1002/wcm.221
-
G. Lin and G. Noubir. On link layer denial of service in data wireless LANs. Wireless Communications and Mobile Computing, 5(3):273-284, May 2005. (Pubitemid 40683562)
-
(2005)
Wireless Communications and Mobile Computing
, vol.5
, Issue.3
, pp. 273-284
-
-
Lin, G.1
Noubir, G.2
-
8
-
-
70349107957
-
Jamming for good: A fresh approach to authentic communication in WSNs
-
Mar.
-
I. Martinovic, P. Pichota, and J. B. Schmitt. Jamming for good: a fresh approach to authentic communication in WSNs. In Proc. of ACM WiSec, pages 161-168, Mar. 2009.
-
(2009)
Proc. of ACM WiSec
, pp. 161-168
-
-
Martinovic, I.1
Pichota, P.2
Schmitt, J.B.3
-
9
-
-
85076878636
-
Enabling MAC protocol implementations on software-defined radios
-
Apr.
-
G. Nychis, T. Hottelier, Z. Yang, S. Seshan, and P. Steenkiste. Enabling MAC protocol implementations on software-defined radios. In Proc. of USENIX NSDI, pages 91-105, Apr. 2009.
-
(2009)
Proc. of USENIX NSDI
, pp. 91-105
-
-
Nychis, G.1
Hottelier, T.2
Yang, Z.3
Seshan, S.4
Steenkiste, P.5
-
10
-
-
31944448836
-
Building a 2.4-GHz radio transceiver using IEEE 802.15.4
-
DOI 10.1109/MCD.2005.1578587
-
N.-J. Oh and S.-G. Lee. Building a 2.4-GHz radio transceiver using IEEE 802.15.4. IEEE Circuits and Devices Magazine, 21(6):43-51, Nov. 2005. (Pubitemid 43186080)
-
(2005)
IEEE Circuits and Devices Magazine
, vol.21
, Issue.6
, pp. 43-51
-
-
Oh, N.-J.1
Lee, S.-G.2
-
11
-
-
80051801375
-
Denial of service attacks in wireless networks: The case of jammers
-
second quarter (to appear)
-
K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy. Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys & Tutorials, PP(99):1-13, second quarter 2011 (to appear).
-
(2011)
IEEE Communications Surveys & Tutorials
, vol.PP
, Issue.99
, pp. 1-13
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, S.V.3
-
13
-
-
77955388626
-
Selective jamming attacks in wireless networks
-
May
-
A. Proaño and L. Lazos. Selective jamming attacks in wireless networks. In Proc. of IEEE ICC, pages 1-6, May 2010.
-
(2010)
Proc. of IEEE ICC
, pp. 1-6
-
-
Proaño, A.1
Lazos, L.2
-
15
-
-
77956561765
-
Detection of reactive jamming in sensor networks
-
Aug.
-
M. Strasser, B. Danev, and S. Čapkun. Detection of reactive jamming in sensor networks. ACM Transactions on Sensor Networks, 7(2):16:1-29, Aug. 2010.
-
(2010)
ACM Transactions on Sensor Networks
, vol.7
, Issue.2-16
, pp. 1-29
-
-
Strasser, M.1
Danev, B.2
Čapkun, S.3
-
16
-
-
0036793924
-
Denial of service in sensor networks
-
DOI 10.1109/MC.2002.1039518
-
A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, Oct. 2002. (Pubitemid 35186161)
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
17
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of ACM MobiHoc, pages 46-57, May 2005. (Pubitemid 43037582)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
|