-
2
-
-
77956259825
-
A jamming-resistant MAC protocol for single-hop wireless networks
-
B. Awerbuch, A. Richa, and C. Scheideler. A jamming-resistant MAC protocol for single-hop wireless networks. In Proc. of PODC'08, 2008.
-
(2008)
Proc. of PODC'08
-
-
Awerbuch, B.1
Richa, A.2
Scheideler, C.3
-
3
-
-
57549113108
-
On the performance of IEEE 802.11 under jamming
-
E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa. On the performance of IEEE 802.11 under jamming. In Proc. of IEEE Infocom'08, pages 1265-1273, 2008.
-
(2008)
Proc. of IEEE Infocom'08
, pp. 1265-1273
-
-
Bayraktaroglu, E.1
King, C.2
Liu, X.3
Noubir, G.4
Rajaraman, R.5
Thapa, B.6
-
4
-
-
32144452400
-
Adversarial contention resolution for simple channels
-
DOI 10.1145/1073970.1074023, SPAA 2005 - Seventeenth Annual ACM Symposium on Parallelism in Algorithms and Architectures
-
M. A. Bender, M. Farach-Colton, S. He, B. C. Kuszmaul, and C. E. Leiserson. Adversarial contention resolution for simple channels. In Proc. of SPAA'05, pages 325-332, 2005. (Pubitemid 43206586)
-
(2005)
Annual ACM Symposium on Parallelism in Algorithms and Architectures
, pp. 325-332
-
-
Bender, M.A.1
Farach-Colton, M.2
He, S.3
Kuszmaul, B.C.4
Leiserson, C.E.5
-
5
-
-
33748061660
-
Jamming and sensing of encrypted wireless ad hoc networks
-
Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, MOBIHOC 2006
-
T. Brown, J. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proc. of MobiHoc'06, pages 120-130, 2006. (Pubitemid 44300713)
-
(2006)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, vol.2006
, pp. 120-130
-
-
Brown, T.X.1
James, J.E.2
Sethi, A.3
-
6
-
-
37749010823
-
Cross-layer jamming detection and mitigation in wireless broadcast networks
-
J. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proc. of MobiCom'07, pages 346-349, 2007.
-
(2007)
Proc. of MobiCom'07
, pp. 346-349
-
-
Chiang, J.1
Hu, Y.-C.2
-
8
-
-
33745192089
-
Broadcasting algorithms in radio networks with unknown topology
-
A. Czumaj and W. Rytter. Broadcasting algorithms in radio networks with unknown topology. Journal of Algorithms, 60(2):115 - 143, 2006.
-
(2006)
Journal of Algorithms
, vol.60
, Issue.2
, pp. 115-143
-
-
Czumaj, A.1
Rytter, W.2
-
9
-
-
84904444588
-
Reliable distributed computing on unreliable radio channels
-
S. Dolev, S. Gilbert, R. Guerraoui, D. Kowalski, C. Newport, F. Kuhn, and N. Lynch. Reliable distributed computing on unreliable radio channels. In Proc. 2009 MobiHoc S3 Workshop, 2009.
-
(2009)
Proc. 2009 MobiHoc S3 Workshop
-
-
Dolev, S.1
Gilbert, S.2
Guerraoui, R.3
Kowalski, D.4
Newport, C.5
Kuhn, F.6
Lynch, N.7
-
11
-
-
38049049434
-
Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks
-
S. Gilbert, R. Guerraoui, and C. Newport. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In Proc. of OPODIS'06, 2006.
-
(2006)
Proc. of OPODIS'06
-
-
Gilbert, S.1
Guerraoui, R.2
Newport, C.3
-
12
-
-
0001153669
-
Analysis of backoff protocols for multiple access channels
-
J. Hastad, T. Leighton, and B. Rogoff. Analysis of backoff protocols for mulitiple accesschannels. SIAM Journal on Computing, 25(4):740-774, 1996. (Pubitemid 126558677)
-
(1996)
SIAM Journal on Computing
, vol.25
, Issue.4
, pp. 740-774
-
-
Hastad, J.1
Leighton, T.2
Rogoff, B.3
-
13
-
-
33847307810
-
Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless LANs
-
DOI 10.1145/1090191.1080107
-
M. Heusse, F. Rousseau, R. Guillier, and A. Duda. Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless lans. In Proc. Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pages 121-132, 2005. (Pubitemid 46323499)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 121-132
-
-
Heusse, M.1
Rousseau, F.2
Guillier, R.3
Duda, A.4
-
16
-
-
33745949686
-
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
-
DOI 10.1145/1102219.1102234, SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
-
Y. Law, L. van Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. In Proc. of SASN'05, pages 76-88, 2005. (Pubitemid 44059934)
-
(2005)
SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
, vol.2005
, pp. 76-88
-
-
Law, Y.W.1
Van Hoesel, L.2
Doumen, J.3
Hartel, P.4
Havinga, P.5
-
17
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
DOI 10.1109/INFCOM.2007.155, 4215737, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
M. Li, I. Koutsopoulos, and R. Poovendran. Optimal jamming attacks and network defense policies in wireless sensor networks. In Proc. of Infocom'07, pages 1307-1315, 2007. (Pubitemid 47334355)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1307-1315
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
18
-
-
34548295754
-
SPREAD: Foiling smart jammers using multi-layer agility
-
DOI 10.1109/INFCOM.2007.316, 4215898, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
X. Liu, G. Noubir, R. Sundaram, and S. Tan. Spread: Foiling smart jammers using multi-layer agility. In Proc. of Infocom'07, pages 2536-2540, 2007. (Pubitemid 47334516)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 2536-2540
-
-
Liu, X.1
Noubir, G.2
Sundaram, R.3
Tan, S.4
-
22
-
-
57549114031
-
Feasibility and complexity of broadcasting with random transmission failures
-
A. Pelc and D. Peleg. Feasibility and complexity of broadcasting with random transmission failures. In Proc. of PODC'05, 2005.
-
(2005)
Proc. of PODC'05
-
-
Pelc, A.1
Peleg, D.2
-
23
-
-
0032107964
-
Stochastic contention resolution with short delays
-
P. Raghavan and E. Upfal. Stochastic contention resolution with short delays. SIAM Journal on Computing, 28(2):709-719, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.2
, pp. 709-719
-
-
Raghavan, P.1
Upfal, E.2
-
27
-
-
34548311320
-
Intelligent jamming in wireless networks with applications to 802.11b and other networks
-
D. Thuente and M. Acharya. Intelligent jamming in wireless networks with applications to 802.11b and other networks. In Proc. of MILCOM'06, 2006.
-
(2006)
Proc. of MILCOM'06
-
-
Thuente, D.1
Acharya, M.2
-
28
-
-
45749134626
-
DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4- based wireless networks
-
A. Wood, J. Stankovic, and G. Zhou. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4- based wireless networks. In Proc. of SECON'07, 2007.
-
(2007)
Proc. of SECON'07
-
-
Wood, A.1
Stankovic, J.2
Zhou, G.3
-
29
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of MobiHoc'05, pages 46-57, 2005. (Pubitemid 43037582)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
30
-
-
11244260535
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
W. Xu, T. Wood, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proc. of Workshop on Wireless Security, 2004.
-
(2004)
Proc. of Workshop on Wireless Security
-
-
Xu, W.1
Wood, T.2
Zhang, Y.3
|