메뉴 건너뛰기




Volumn , Issue , 2011, Pages 47-52

Short paper: Reactive jamming in wireless networks - How realistic is the threat?

Author keywords

802.15.4; Reactive jamming; Software defined jammer; WSN

Indexed keywords

802.15.4; HIGH PRECISION; IEEE 802.15.4 NETWORKS; JAMMERS; JAMMING STRATEGIES; PHYSICAL LAYERS; RADIO FREQUENCIES; REACTIVE JAMMING; REAL TIME REQUIREMENT; SOFTWARE-DEFINED JAMMER; STEPPING STONE; WSN;

EID: 80051886930     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1998412.1998422     Document Type: Conference Paper
Times cited : (225)

References (17)
  • 2
    • 79951949189 scopus 로고    scopus 로고
    • Cross-layer jamming detection and mitigation in wireless broadcast networks
    • Feb.
    • J. T. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Transactions on Networking, 19(1):286-298, Feb. 2011.
    • (2011) IEEE/ACM Transactions on Networking , vol.19 , Issue.1 , pp. 286-298
    • Chiang, J.T.1    Hu, Y.-C.2
  • 6
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and network defense policies in wireless sensor networks
    • DOI 10.1109/INFCOM.2007.155, 4215737, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • M. Li, I. Koutsopoulos, and R. Poovendran. Optimal jamming attacks and network defense policies in wireless sensor networks. In Proc. of IEEE INFOCOM, pages 1307-1315, May 2007. (Pubitemid 47334355)
    • (2007) Proceedings - IEEE INFOCOM , pp. 1307-1315
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 7
    • 18844450713 scopus 로고    scopus 로고
    • On link layer denial of service in data wireless LANs
    • DOI 10.1002/wcm.221
    • G. Lin and G. Noubir. On link layer denial of service in data wireless LANs. Wireless Communications and Mobile Computing, 5(3):273-284, May 2005. (Pubitemid 40683562)
    • (2005) Wireless Communications and Mobile Computing , vol.5 , Issue.3 , pp. 273-284
    • Lin, G.1    Noubir, G.2
  • 8
    • 70349107957 scopus 로고    scopus 로고
    • Jamming for good: A fresh approach to authentic communication in WSNs
    • Mar.
    • I. Martinovic, P. Pichota, and J. B. Schmitt. Jamming for good: a fresh approach to authentic communication in WSNs. In Proc. of ACM WiSec, pages 161-168, Mar. 2009.
    • (2009) Proc. of ACM WiSec , pp. 161-168
    • Martinovic, I.1    Pichota, P.2    Schmitt, J.B.3
  • 10
    • 31944448836 scopus 로고    scopus 로고
    • Building a 2.4-GHz radio transceiver using IEEE 802.15.4
    • DOI 10.1109/MCD.2005.1578587
    • N.-J. Oh and S.-G. Lee. Building a 2.4-GHz radio transceiver using IEEE 802.15.4. IEEE Circuits and Devices Magazine, 21(6):43-51, Nov. 2005. (Pubitemid 43186080)
    • (2005) IEEE Circuits and Devices Magazine , vol.21 , Issue.6 , pp. 43-51
    • Oh, N.-J.1    Lee, S.-G.2
  • 11
    • 80051801375 scopus 로고    scopus 로고
    • Denial of service attacks in wireless networks: The case of jammers
    • second quarter (to appear)
    • K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy. Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys & Tutorials, PP(99):1-13, second quarter 2011 (to appear).
    • (2011) IEEE Communications Surveys & Tutorials , vol.PP , Issue.99 , pp. 1-13
    • Pelechrinis, K.1    Iliofotou, M.2    Krishnamurthy, S.V.3
  • 13
    • 77955388626 scopus 로고    scopus 로고
    • Selective jamming attacks in wireless networks
    • May
    • A. Proaño and L. Lazos. Selective jamming attacks in wireless networks. In Proc. of IEEE ICC, pages 1-6, May 2010.
    • (2010) Proc. of IEEE ICC , pp. 1-6
    • Proaño, A.1    Lazos, L.2
  • 16
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • DOI 10.1109/MC.2002.1039518
    • A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, Oct. 2002. (Pubitemid 35186161)
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.