-
1
-
-
33748061660
-
Jamming and sensing of encrypted wireless ad hoc networks
-
Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, MOBIHOC 2006
-
T.X. Brown, J.E. James, and A. Sethi, "Jamming and Sensing of Encrypted Wireless Ad Hoc Networks," Proc. ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 120-130, 2006. (Pubitemid 44300713)
-
(2006)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, vol.2006
, pp. 120-130
-
-
Brown, T.X.1
James, J.E.2
Sethi, A.3
-
2
-
-
33845635202
-
Wormhole-based antijamming techniques in sensor networks
-
DOI 10.1109/TMC.2007.250674
-
M. Cagalj, S. Capkun, and J.-P. Hubaux, "Wormhole-Based Anti-Jamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing, vol. 6, no. 1, pp. 100-114, Jan. 2007. (Pubitemid 44955817)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.1
, pp. 100-114
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.-P.3
-
3
-
-
51649118582
-
Control channel jamming: Resilience and identification of traitors
-
A. Chan, X. Liu, G. Noubir, and B. Thapa, "Control Channel Jamming: Resilience and Identification of Traitors," Proc. IEEE Int'l Symp. Information Theory (ISIT), 2007.
-
(2007)
Proc. IEEE Int'l Symp. Information Theory (ISIT)
-
-
Chan, A.1
Liu, X.2
Noubir, G.3
Thapa, B.4
-
4
-
-
70350577004
-
Intelligent sensing and classification in ad hoc networks: A case study
-
Aug.
-
T. Dempsey, G. Sahin, Y. Morton, and C. Hopper, "Intelligent Sensing and Classification in Ad Hoc Networks: A Case Study," IEEE Aerospace and Electronic Systems Magazine, vol. 24, no. 8, pp. 23-30, Aug. 2009.
-
(2009)
IEEE Aerospace and Electronic Systems Magazine
, vol.24
, Issue.8
, pp. 23-30
-
-
Dempsey, T.1
Sahin, G.2
Morton, Y.3
Hopper, C.4
-
5
-
-
0346404159
-
Broadcast anti-jamming systems
-
DOI 10.1016/S1389-1286(00)00169-9, PII S1389128600001699
-
Y. Desmedt, "Broadcast Anti-Jamming Systems," Computer Networks, vol. 35, nos. 2/3, pp. 223-236, Feb. 2001. (Pubitemid 33649543)
-
(2001)
Computer Networks
, vol.35
, Issue.2-3
, pp. 223-236
-
-
Desmedt, Y.1
Safavi-Naini, R.2
Wang, H.3
Batten, L.4
Charnes, C.5
Pieprzyk, J.6
-
6
-
-
78049349479
-
FPGA and ASIC implementations of AES
-
Springer
-
K. Gaj and P. Chodowiec, "FPGA and ASIC Implementations of AES," Cryptographic Engineering, pp. 235-294, Springer, 2009.
-
(2009)
Cryptographic Engineering
, pp. 235-294
-
-
Gaj, K.1
Chodowiec, P.2
-
8
-
-
57349141867
-
Improving wireless privacy with an identifier-free link layer protocol
-
B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall, "Improving Wireless Privacy with an Identifier-Free Link Layer Protocol," Proc. Int'l Conf. Mobile Systems, Applications, and Services (MobiSys), 2008.
-
(2008)
Proc. Int'l Conf. Mobile Systems, Applications, and Services (MobiSys)
-
-
Greenstein, B.1
McCoy, D.2
Pang, J.3
Kohno, T.4
Seshan, S.5
Wetherall, D.6
-
9
-
-
0003580691
-
-
IEEE
-
IEEE, IEEE 802.11 Standard, http://standards.ieee.org/getieee802/ download/802.11-2007.pdf, 2007.
-
(2007)
IEEE 802.11 Standard
-
-
-
11
-
-
60449113417
-
Energy-efficient link-layer jamming attacks against WSN MAC protocols
-
Y.W. Law, M. Palaniswami, L.V. Hoesel, J. Doumen, P. Hartel, and P. Havinga, "Energy-Efficient Link-Layer Jamming Attacks against WSN MAC Protocols," ACM Trans. Sensor Networks, vol. 5, no. 1, pp. 1-38, 2009.
-
(2009)
ACM Trans. Sensor Networks
, vol.5
, Issue.1
, pp. 1-38
-
-
Law, Y.W.1
Palaniswami, M.2
Hoesel, L.V.3
Doumen, J.4
Hartel, P.5
Havinga, P.6
-
12
-
-
70349111445
-
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
-
L. Lazos, S. Liu, and M. Krunz, "Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks," Proc. Second ACM Conf. Wireless Network Security, pp. 169-180, 2009.
-
(2009)
Proc. Second ACM Conf. Wireless Network Security
, pp. 169-180
-
-
Lazos, L.1
Liu, S.2
Krunz, M.3
-
13
-
-
18844450713
-
On link layer denial of service in data wireless LANs
-
May
-
G. Lin and G. Noubir, "On Link Layer Denial of Service in Data Wireless LANs," Wireless Comm. and Mobile Computing, vol. 5, no. 3, pp. 273-284, May 2004.
-
(2004)
Wireless Comm. and Mobile Computing
, vol.5
, Issue.3
, pp. 273-284
-
-
Lin, G.1
Noubir, G.2
-
14
-
-
34548295754
-
SPREAD: Foiling smart jammers using multi-layer agility
-
DOI 10.1109/INFCOM.2007.316, 4215898, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
X. Liu, G. Noubir, and R. Sundaram, "Spread: Foiling Smart Jammers Using Multi-Layer Agility," Proc. IEEE INFOCOM, pp. 2536-2540, 2007. (Pubitemid 47334516)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 2536-2540
-
-
Liu, X.1
Noubir, G.2
Sundaram, R.3
Tan, S.4
-
15
-
-
77953306472
-
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
-
Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication," Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
16
-
-
0017959977
-
Secure communications over insecure channels
-
R.C. Merkle, "Secure Communications over Insecure Channels," Comm. ACM, vol. 21, no. 4, pp. 294-299, 1978.
-
(1978)
Comm. ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.C.1
-
17
-
-
29844445404
-
Low-Power DoS attacks in data wireless lans and countermeasures
-
G. Noubir and G. Lin, "Low-Power DoS Attacks in Data Wireless Lans and Countermeasures," Mobile Computing and Comm. Rev., vol. 7, no. 3, pp. 29-30, 2003.
-
(2003)
Mobile Computing and Comm. Rev.
, vol.7
, Issue.3
, pp. 29-30
-
-
Noubir, G.1
Lin, G.2
-
18
-
-
81455139065
-
-
OPNET
-
OPNET "OPNET Modeler 14.5," http://www.opnet.com/, 2011.
-
(2011)
OPNET Modeler 14.5
-
-
-
19
-
-
65449120021
-
RFC 3561: Ad Hoc On-Demand Distance Vector (AODV) routing
-
C. Perkins, E. Belding-Royer, and S. Das, "RFC 3561: Ad Hoc On-Demand Distance Vector (AODV) Routing," Internet RFCs, 2003.
-
(2003)
Internet RFCs
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
21
-
-
84947912552
-
All-or-Nothing Encryption and the Package Transform
-
Fast Software Encryption
-
R. Rivest, "All-or-Nothing Encryption and the Package Transform," Proc. Int'l Workshop Fast Software Encryption, pp. 210-218, 1997. (Pubitemid 127100717)
-
(1997)
Lecture Notes In Computer Science
, Issue.1267
, pp. 210-218
-
-
Rivest, R.L.1
-
22
-
-
0010602889
-
-
Technical Report, Massachusetts Inst. of Technology
-
R. Rivest, A. Shamir, and D. Wagner, "Time-Lock Puzzles and Timed-Release Crypto," technical report, Massachusetts Inst. of Technology, 1996.
-
(1996)
Time-Lock Puzzles and Timed-Release Crypto
-
-
Rivest, R.1
Shamir, A.2
Wagner, D.3
-
26
-
-
0010137766
-
Something about All or Nothing (Transforms)
-
DOI 10.1023/A:1008304703074
-
D. Stinson, "Something about All or Nothing (Transforms)," Designs, Codes and Cryptography, vol. 22, no. 2, pp. 133-138, 2001. (Pubitemid 33672294)
-
(2001)
Designs, Codes, and Cryptography
, vol.22
, Issue.2
, pp. 133-138
-
-
Stinson, D.R.1
-
28
-
-
70450192514
-
Efficient uncoordinated fhss anti-jamming communication
-
M. Strasser, C. Pöpper, and S. Capkun, "Efficient Uncoordinated fhss Anti-Jamming Communication," Proc. ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 207-218, 2009.
-
(2009)
Proc. ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 207-218
-
-
Strasser, M.1
Pöpper, C.2
Capkun, S.3
-
29
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
M. Strasser, C. Pöpper, S. Capkun, and M. Cagalj, "Jamming-Resistant Key Establishment Using Uncoordinated Frequency Hopping," Proc. IEEE Symp. Security and Privacy, 2008.
-
(2008)
Proc. IEEE Symp. Security and Privacy
-
-
Strasser, M.1
Pöpper, C.2
Capkun, S.3
Cagalj, M.4
-
30
-
-
44349085254
-
Probabilistic mitigation of control channel jamming via random key distribution
-
P. Tague, M. Li, and R. Poovendran, "Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution," Proc. IEEE Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC), 2007.
-
(2007)
Proc. IEEE Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC)
-
-
Tague, P.1
Li, M.2
Poovendran, R.3
-
31
-
-
67651183943
-
Mitigation of control channel jamming under node capture attacks
-
Sept.
-
P. Tague, M. Li, and R. Poovendran, "Mitigation of Control Channel Jamming under Node Capture Attacks," IEEE Trans. Mobile Computing, vol. 8, no. 9, pp. 1221-1234, Sept. 2009.
-
(2009)
IEEE Trans. Mobile Computing
, vol.8
, Issue.9
, pp. 1221-1234
-
-
Tague, P.1
Li, M.2
Poovendran, R.3
-
32
-
-
80051912129
-
On the robustness of IEEE802.11 rate adaptation algorithms against smart Jamming
-
B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng, "On the Robustness of IEEE802.11 Rate Adaptation Algorithms against Smart Jamming," Proc. ACM Conf. Wireless Network Security (WiSec), 2011.
-
(2011)
Proc. ACM Conf. Wireless Network Security (WiSec)
-
-
Thapa, B.1
Noubir, G.2
Rajaramanand, R.3
Sheng, B.4
-
33
-
-
51949113065
-
Intelligent jamming in wireless networks with applications to 802.11 b and other networks
-
D. Thuente and M. Acharya, "Intelligent Jamming in Wireless Networks with Applications to 802.11 b and Other Networks," Proc. IEEE Military Comm. Conf. (MILCOM), 2006.
-
(2006)
Proc. IEEE Military Comm. Conf. (MILCOM)
-
-
Thuente, D.1
Acharya, M.2
-
34
-
-
80051886930
-
Reactive jamming in wireless networks: How realistic is the threat
-
M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders, "Reactive Jamming in Wireless Networks: How Realistic Is the Threat," Proc. ACM Conf. Wireless Network Security (WiSec), 2011.
-
(2011)
Proc. ACM Conf. Wireless Network Security (WiSec)
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.3
Lenders, V.4
-
35
-
-
56749150049
-
Anti-Jamming timing channels for wireless networks
-
W. Xu, W. Trappe, and Y. Zhang, "Anti-Jamming Timing Channels for Wireless Networks," Proc. ACM Conf. Wireless Network Security (WiSec), pp. 203-213, 2008.
-
(2008)
Proc. ACM Conf. Wireless Network Security (WiSec)
, pp. 203-213
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
36
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 46-57, 2005. (Pubitemid 43037582)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
37
-
-
11244260535
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
-
W. Xu, T. Wood, W. Trappe, and Y. Zhang, "Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service," Proc. Third ACM Workshop Wireless Security, pp. 80-89, 2004. (Pubitemid 40062798)
-
(2004)
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
, pp. 80-89
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
|