메뉴 건너뛰기




Volumn 30, Issue 1, 2012, Pages 16-30

Towards optimal adaptive UFH-based anti-jamming wireless communication

Author keywords

Anti jamming; multi armed bandit problem; uncoordinated frequency hopping; wireless communication

Indexed keywords

ANTI-JAMMING; EXTENSIVE SIMULATIONS; INTERNAL STRUCTURE; MULTI ARMED BANDIT; MULTI-ARMED BANDIT PROBLEM; ONLINE OPTIMIZATION; OPTIMALITY; PERFORMANCE CHARACTERIZATION; PERFORMANCE EVALUATION; SPACE COMPLEXITY; STRATEGY SELECTION; THEORETICAL FOUNDATIONS; WIRELESS COMMUNICATION; WIRELESS COMMUNICATIONS;

EID: 84855425212     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2012.120103     Document Type: Article
Times cited : (62)

References (29)
  • 1
    • 79960855950 scopus 로고    scopus 로고
    • Delay-bounded adaptive ufhbased anti-jamming wireless communication
    • Q. Wang, P. Xu, K. Ren, and X.-Y. Li, "Delay-bounded adaptive ufhbased anti-jamming wireless communication," in Proc. IEEE INFOCOM' 11, 2011, pp. 1413-1421.
    • (2011) Proc. IEEE INFOCOM' 11 , pp. 1413-1421
    • Wang, Q.1    Xu, P.2    Ren, K.3    Li, X.-Y.4
  • 2
    • 70349111445 scopus 로고    scopus 로고
    • Mitigating control-channel jamming attacks in multi-channel ad hoc networks
    • L. Lazos, S. Liu, and M. Krunz, "Mitigating control-channel jamming attacks in multi-channel ad hoc networks," in Proc. ACM WISEC'09, 2009, pp. 169-180.
    • (2009) Proc. ACM WISEC'09 , pp. 169-180
    • Lazos, L.1    Liu, S.2    Krunz, M.3
  • 3
    • 70349110082 scopus 로고    scopus 로고
    • A coding-theoretic approach for efficient message verification over insecure channels
    • D. Slater, P. Tague, R. Poovendran, and B. J. Matt, "A coding-theoretic approach for efficient message verification over insecure channels," in Proc. ACM WISEC'09, 2009, pp. 151-160.
    • (2009) Proc. ACM WISEC'09 , pp. 151-160
    • Slater, D.1    Tague, P.2    Poovendran, R.3    Matt, B.J.4
  • 6
    • 70450192514 scopus 로고    scopus 로고
    • Efficient uncoordinated fhss anti-jamming communication
    • M. Strasser, C. Pöpper, and S. Capkun, "Efficient uncoordinated fhss anti-jamming communication," in Proc. ACM MobiHoc'09, 2009, pp. 207-218.
    • (2009) Proc. ACM MobiHoc'09 , pp. 207-218
    • Strasser, M.1    Pöpper, C.2    Capkun, S.3
  • 7
    • 50249175122 scopus 로고    scopus 로고
    • Jamming-resistant key establishment using uncoordinated frequency hopping
    • M. Strasser, C. Pöpper, S. Capkun, and M. Cagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE S&P'08, 2008, pp. 64-78.
    • (2008) Proc. IEEE S&P'08 , pp. 64-78
    • Strasser, M.1    Pöpper, C.2    Capkun, S.3    Cagalj, M.4
  • 9
    • 77953998228 scopus 로고    scopus 로고
    • Zero pre-shared secret key establishment in the presence of jammers
    • T. Jin, G. Noubir, and B. Thapa, "Zero pre-shared secret key establishment in the presence of jammers," in Proc. MobiHoc'09, 2009, pp. 219-228.
    • (2009) Proc. MobiHoc'09 , pp. 219-228
    • Jin, T.1    Noubir, G.2    Thapa, B.3
  • 10
    • 77953306472 scopus 로고    scopus 로고
    • Randomized differential dsss: Jamming-resistant wireless broadcast communication
    • Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized differential dsss: Jamming-resistant wireless broadcast communication," in Proc. IEEE INFOCOM'10, 2010, pp. 695-703.
    • (2010) Proc. IEEE INFOCOM'10 , pp. 695-703
    • Liu, Y.1    Ning, P.2    Dai, H.3    Liu, A.4
  • 12
    • 70450257659 scopus 로고    scopus 로고
    • Throughput-efficient sequential channel sensing and probing in cognitive radio networks under sensing errors
    • T. Shu and M. Krunz, "Throughput-efficient sequential channel sensing and probing in cognitive radio networks under sensing errors," in Proc. MobiCom'09, 2009, pp. 37-48.
    • (2009) Proc. MobiCom'09 , pp. 37-48
    • Shu, T.1    Krunz, M.2
  • 14
    • 0001043843 scopus 로고
    • Restless bandits: Activity allocation in a changing world
    • P. Whittle, "Restless bandits: activity allocation in a changing world," Journal of Applied Probability, vol. 25A, pp. 287-298, 1988.
    • (1988) Journal of Applied Probability , vol.25 A , pp. 287-298
    • Whittle, P.1
  • 15
    • 0029513526 scopus 로고
    • Gambling in a rigged casino: The adversarial multi-arm bandit problem
    • P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire, "Gambling in a rigged casino: The adversarial multi-arm bandit problem," in Proc. IEEE FOCS'95, 1995, pp. 322-331.
    • (1995) Proc. IEEE FOCS'95 , pp. 322-331
    • Auer, P.1    Cesa-Bianchi, N.2    Freund, Y.3    Schapire, R.E.4
  • 17
    • 9444243189 scopus 로고    scopus 로고
    • Efficient algorithms for online decision problems
    • Learning Theory and Kernel Machines
    • A. Kalai and S. Vempala, "Efficient algorithms for online decision problems," in Proc. COLT'03, 2003, pp. 26-40. (Pubitemid 37053193)
    • (2003) Lecture Notes in Computer Science , Issue.2777 , pp. 26-40
    • Kalai, A.1    Vempala, S.2
  • 18
    • 4544345025 scopus 로고    scopus 로고
    • Adaptive routing with end-to-end feedback: Distributed learning and geometric approaches
    • B. Awerbuch and R. D. Kleinberg, "Adaptive routing with end-to-end feedback: distributed learning and geometric approaches," in Proc. ACM STOC'04, 2004, pp. 45-53.
    • (2004) Proc. ACM STOC'04 , pp. 45-53
    • Awerbuch, B.1    Kleinberg, R.D.2
  • 19
    • 9444257628 scopus 로고    scopus 로고
    • Online geometric optimization in the bandit setting against an adaptive adversary
    • Learning Theory
    • H. B. McMahan and A. Blum, "Online geometric optimization in the bandit setting against an adaptive adversary," in Proc. COLT'04, 2004, pp. 109-123. (Pubitemid 38940329)
    • (2004) Lecture Notes in Computer Science , Issue.3120 , pp. 109-123
    • McMahan, H.B.1    Blum, A.2
  • 21
    • 24644463787 scopus 로고    scopus 로고
    • Efficient algorithms for online decision problems
    • DOI 10.1016/j.jcss.2004.10.016, PII S0022000004001394
    • A. T. Kalai and S. Vempala, "Efficient algorithms for online decision problems," Journal of Computer System and Sciences, vol. 71, no. 3, pp. 291-307, 2005. (Pubitemid 41278182)
    • (2005) Journal of Computer and System Sciences , vol.71 , Issue.3 , pp. 291-307
    • Kalai, A.1    Vempala, S.2
  • 23
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Springer-Verlag
    • D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing," in Proc. ASIACRYPT'01. Springer-Verlag, pp. 514-532.
    • Proc. ASIACRYPT'01 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 24
    • 76249105714 scopus 로고    scopus 로고
    • Multiple round random ball placement: Power of second chance
    • X.-Y. Li, Y. Wang, and W. Feng, "Multiple round random ball placement: Power of second chance," in Proc. COCOON '09, 2009, pp. 439- 448.
    • (2009) Proc. COCOON '09 , pp. 439-448
    • Li, X.-Y.1    Wang, Y.2    Feng, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.