-
3
-
-
34548307187
-
Using channel hopping to increase 802.11 resilience to jamming attacks
-
V. Navda, A. Bohra, S. Ganguly, and D. Rubenstein, "Using channel hopping to increase 802.11 resilience to jamming attacks," in Proceedings of IEEE INFOCOM, 2007.
-
Proceedings of IEEE INFOCOM, 2007
-
-
Navda, V.1
Bohra, A.2
Ganguly, S.3
Rubenstein, D.4
-
5
-
-
36949015142
-
Understanding and mitigating the impact of RF interference on 802.11 networks
-
R. Gummadi, D. Wetherall, B. Greenstein, and S. Seshan, "Understanding and mitigating the impact of RF interference on 802.11 networks," in Proceedings of ACM SIGCOMM, 2007.
-
Proceedings of ACM SIGCOMM, 2007
-
-
Gummadi, R.1
Wetherall, D.2
Greenstein, B.3
Seshan, S.4
-
7
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
M. Strasser, C. Pöper, S. Čapkun, and M. Čagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proceedings of the 2008 IEEE Symposium on Security and Privacy, 2008, pp. 64-78.
-
Proceedings of the 2008 IEEE Symposium on Security and Privacy, 2008
, pp. 64-78
-
-
Strasser, M.1
Pöper, C.2
Čapkun, S.3
Čagalj, M.4
-
9
-
-
70349110082
-
A coding-theoretic approach for efficient message verification over insecure channels
-
D. Slater, P. Tague, R. Poovendran, and B. Matt, "A coding-theoretic approach for efficient message verification over insecure channels," in Procceedings of the 2nd ACM Conference on Wireless Networking Security (WiSec '09), March 2009, pp. 151-160.
-
Procceedings of the 2nd ACM Conference on Wireless Networking Security (WiSec '09), March 2009
, pp. 151-160
-
-
Slater, D.1
Tague, P.2
Poovendran, R.3
Matt, B.4
-
11
-
-
77953306472
-
Randomized differential dsss: Jamming-resistant wireless broadcast communication
-
Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized differential dsss: Jamming-resistant wireless broadcast communication," in Proceedings of the 2010 IEEE INFOCOM, 2010.
-
Proceedings of the 2010 IEEE INFOCOM, 2010
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
13
-
-
51249093755
-
Seluge: Secure and dos-resistant code dissemination in wireless sensor networks
-
S. Hyun, P. Ning, A. Liu, and W. Du, "Seluge: Secure and dos-resistant code dissemination in wireless sensor networks," in Proceedings of the Seventh International Conference on Information Processing in Sensor Networks (IPSN '08), April 2008, pp. 445-456.
-
Proceedings of the Seventh International Conference on Information Processing in Sensor Networks (IPSN '08), April 2008
, pp. 445-456
-
-
Hyun, S.1
Ning, P.2
Liu, A.3
Du, W.4
-
14
-
-
84876090772
-
-
Crossbow Technology Inc.
-
Crossbow Technology Inc., "MICA2 data sheet."
-
MICA2 Data Sheet
-
-
-
15
-
-
70349281772
-
-
"MICAz: Wireless measurement system," http://www.memsic.com/ support/documentation/wireless-sensor-networks/category/7-datasheets.html? download=148:micaz.
-
MICAz: Wireless Measurement System
-
-
-
16
-
-
84871983001
-
-
"TelosB mote platform," http://www.memsic.com/support/ documentation/wireless-sensor-networks/category/7-datasheets.html? download=152:telosb.
-
TelosB Mote Platform
-
-
-
17
-
-
34547282118
-
TinySeRSync: Secure and resilient time synchronization in wireless sensor networks
-
K. Sun, P. Ning, C. Wang, A. Liu, and Y. Zhou, "TinySeRSync: Secure and resilient time synchronization in wireless sensor networks," in Proceedings of 13th ACM Conference on Computer and Communications Security (CCS '06), October/November 2006, pp. 264-277.
-
Proceedings of 13th ACM Conference on Computer and Communications Security (CCS '06), October/November 2006
, pp. 264-277
-
-
Sun, K.1
Ning, P.2
Wang, C.3
Liu, A.4
Zhou, Y.5
-
18
-
-
0038487088
-
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE Symposium on Research in Security and Privacy, 2003, pp. 197-213.
-
IEEE Symposium on Research in Security and Privacy, 2003
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
20
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, and P. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), October 2003, pp. 42-51.
-
Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), October 2003
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
-
21
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), October 2003, pp. 62-72.
-
Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), October 2003
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
22
-
-
84866860550
-
Improving key pre-distribution with deployment knowledge in static sensor networks
-
November
-
D. Liu and P. Ning, "Improving key pre-distribution with deployment knowledge in static sensor networks," ACM Transactions on Sensor Networks, vol. 1, no. 2, pp. 204-239, November 2005.
-
(2005)
ACM Transactions on Sensor Networks
, vol.1
, Issue.2
, pp. 204-239
-
-
Liu, D.1
Ning, P.2
-
23
-
-
33144472210
-
Secure time synchronization service for sensor networks
-
S. Ganeriwal, S. Capkun, C. Han, and M. B. Srivastava, "Secure time synchronization service for sensor networks," in Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005), September 2005, pp. 97-106.
-
Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005), September 2005
, pp. 97-106
-
-
Ganeriwal, S.1
Capkun, S.2
Han, C.3
Srivastava, M.B.4
-
24
-
-
33745931868
-
Time synchronization attacks in sensor networks
-
M. Manzo, T. Roosta, and S. Sastry, "Time synchronization attacks in sensor networks," in Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, 2005, pp. 107-116.
-
Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005
, pp. 107-116
-
-
Manzo, M.1
Roosta, T.2
Sastry, S.3
-
26
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05), 2005.
-
Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05), 2005
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
28
-
-
85019620107
-
Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks
-
P. Levis, N. Patel, D. Culler, and S. Shenker, "Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks," in Proceedings of the 1st Symposium on Network System Design and Implementation (NSDI '04), March 2004.
-
Proceedings of the 1st Symposium on Network System Design and Implementation (NSDI '04), March 2004
-
-
Levis, P.1
Patel, N.2
Culler, D.3
Shenker, S.4
-
29
-
-
80052415326
-
-
Crossbow
-
Crossbow, "Tinyos getting started guide," http://www.xbow.com/ support/support pdf files/getting started guide.pdf.
-
Tinyos Getting Started Guide
-
-
-
30
-
-
56749150049
-
Anti-jamming timing channels for wireless networks
-
New York, NY, USA: ACM
-
W. Xu, W. Trappe, and Y. Zhang, "Anti-jamming timing channels for wireless networks," in WiSec '08: Proceedings of the first ACM conference on Wireless network security. New York, NY, USA: ACM, 2008, pp. 203-213.
-
(2008)
WiSec '08: Proceedings of the First ACM Conference on Wireless Network Security
, pp. 203-213
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
31
-
-
44349085254
-
Probabilistic mitigation of control channel jamming via random key distribution
-
P. Tague, M. Li, and R. Poovendran, "Probabilistic mitigation of control channel jamming via random key distribution," in Proceedings of IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '07), 2007, pp. 1-5.
-
Proceedings of IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '07), 2007
, pp. 1-5
-
-
Tague, P.1
Li, M.2
Poovendran, R.3
|