-
2
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), 2005, pp. 46-57. (Pubitemid 43037582)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
3
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
M. Strasser, C. Popper, S. Capkun, and M. Cagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE Symp. Security and Privacy, 2008, pp. 64-78.
-
(2008)
Proc. IEEE Symp. Security and Privacy
, pp. 64-78
-
-
Strasser, M.1
Popper, C.2
Capkun, S.3
Cagalj, M.4
-
4
-
-
48749133065
-
Keyless jam resistance
-
L. Baird, W. Bahn, M. Collins, M. Carlisle, and S. Butler, "Keyless jam resistance," in Proc. IEEE Inf. Assurance and Security Workshop, 2007, pp. 143-150.
-
(2007)
Proc. IEEE Inf. Assurance and Security Workshop
, pp. 143-150
-
-
Baird, L.1
Bahn, W.2
Collins, M.3
Carlisle, M.4
Butler, S.5
-
5
-
-
77953998228
-
Zero pre-shared secret key establishment in the presence of jammers
-
New Orleans, LA
-
T. Jin, G.Noubir, and B. Thapa, "Zero pre-shared secret key establishment in the presence of jammers," in Proc. ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), New Orleans, LA, 2009.
-
(2009)
Proc. ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Jin, T.1
Noubir, G.2
Thapa, B.3
-
6
-
-
70349111445
-
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
-
Zurich, Switzerland
-
L. Lazos, S. Liu, and M. Krunz, "Mitigating control-channel jamming attacks in multi-channel ad hoc networks," in Proc. ACM WiSec, Zurich, Switzerland, 2009.
-
(2009)
Proc. ACM WiSec
-
-
Lazos, L.1
Liu, S.2
Krunz, M.3
-
8
-
-
77956239329
-
Gossiping in a multi-channel radio network
-
Lemesos, Cyprus
-
S. Dolev, S. Gilbert, R. Guerraoui, and C. Newport, "Gossiping in a multi-channel radio network," in Proc. Int. Symp. Distributed Computing (DISC'07), Lemesos,, Cyprus, 2007.
-
(2007)
Proc. Int. Symp. Distributed Computing (DISC'07)
-
-
Dolev, S.1
Gilbert, S.2
Guerraoui, R.3
Newport, C.4
-
9
-
-
85034799271
-
Jamming-resistant broadcast communication without shared keys
-
Montreal, Canada
-
C. Popper,M. Strasser, and S. Capkun, "Jamming-resistant broadcast communication without shared keys," in Proc. USENIX Security Symp., Montreal, Canada, 2009.
-
(2009)
Proc. USENIX Security Symp.
-
-
Popper, C.1
Strasser, M.2
Capkun, S.3
-
10
-
-
70450192514
-
Efficient uncoordinated FHSS anti-jamming communication
-
New Orleans, LA
-
M. Strasser, C. Popper, and S. Capkun, "Efficient uncoordinated FHSS anti-jamming communication," in Proc. ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), New Orleans, LA, 2009.
-
(2009)
Proc. ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Strasser, M.1
Popper, C.2
Capkun, S.3
-
11
-
-
79960882539
-
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
-
Jun
-
C. Popper,M. Strasser, and S. Capkun, "Anti-jamming broadcast communication using uncoordinated spread spectrum techniques," IEEE J. Sel. Areas Commun., vol. 28, no. 5, pp. 703-715, Jun. 2010.
-
(2010)
IEEE J. Sel. Areas Commun.
, vol.28
, Issue.5
, pp. 703-715
-
-
Popper, C.1
Strasser, M.2
Capkun, S.3
-
12
-
-
57549101228
-
Secure communication over radio channels
-
Toronto, Canada
-
S. Dolev, S. Gilbert, R. Guerraoui, and C. Newport, "Secure communication over radio channels," in Proc. ACM PODC, Toronto, Canada, 2008.
-
(2008)
Proc. ACM PODC
-
-
Dolev, S.1
Gilbert, S.2
Guerraoui, R.3
Newport, C.4
-
13
-
-
78751527470
-
Defending DSSS-based broadcast communication against insider jammers via delayed seeddisclosure
-
Austin, TX
-
A. Liu, P. Ning, H. Dai, Y. Liu, and C.Wang, "Defending DSSS-based broadcast communication against insider jammers via delayed seeddisclosure, " in Proc. IEEE Ann. Computer Security Applications Conf. (ACSAC), Austin, TX, 2010.
-
(2010)
Proc. IEEE Ann. Computer Security Applications Conf. (ACSAC)
-
-
Liu, A.1
Ning, P.2
Dai, H.3
Liu, Y.4
Wang, C.5
-
14
-
-
70349110082
-
A coding-theoretic approach for efficient message verification over insecure channels
-
Zurich, Switzerland
-
D. Slater, P. Tague, R. Poovendran, and B. Matt, "A coding-theoretic approach for efficient message verification over insecure channels," in Proc. ACM Conf. Wireless Network Security (WiSec'09), Zurich, Switzerland, 2009.
-
(2009)
Proc. ACM Conf. Wireless Network Security (WiSec'09)
-
-
Slater, D.1
Tague, P.2
Poovendran, R.3
Matt, B.4
-
15
-
-
78650975080
-
USD-FH: Jamming-resistantwireless communication using frequency hopping with uncoordinated seed disclosure
-
A. Liu, P. Ning,H.Dai, and Y. Liu, "USD-FH: Jamming- resistantwireless communication using frequency hopping with uncoordinated seed disclosure," in Proc. 7th IEEE Int. Conf. Mobile Ad-Hoc and Sensor Systems, 2010, pp. 41-50.
-
(2010)
Proc. 7th IEEE Int. Conf. Mobile Ad-Hoc and Sensor Systems
, pp. 41-50
-
-
Liu, A.1
Ning, P.2
Dai, H.3
Liu, Y.4
-
16
-
-
77953306472
-
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
-
Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized differential DSSS: Jamming-resistant wireless broadcast communication," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), 2010, pp. 1-9.
-
(2010)
Proc. IEEE Int. Conf. Computer Communications (INFOCOM)
, pp. 1-9
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
17
-
-
70349684521
-
Interferenceresilient information exchange
-
S. Gilbert, R. Guerraoui, D. Kowalski, and C. Newport, "Interferenceresilient information exchange," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), 2009, pp. 2249-2257.
-
(2009)
Proc. IEEE Int. Conf. Computer Communications (INFOCOM)
, pp. 2249-2257
-
-
Gilbert, S.1
Guerraoui, R.2
Kowalski, D.3
Newport, C.4
-
18
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
DOI 10.1109/INFCOM.2007.155, 4215737, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), 2007, pp. 1307-1315. (Pubitemid 47334355)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1307-1315
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
19
-
-
35348897340
-
Channel surfing: Defending wireless sensor networks from interference
-
DOI 10.1145/1236360.1236423, IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
-
W. Xu, W. Trappe, and Y. Zhang, "Channel surfing: Defending wireless sensor networks frominterference," in Proc. Int. Conf. Information Processing in Sensor Networks (IPSN), 2007, pp. 499-508. (Pubitemid 47582180)
-
(2007)
IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
, pp. 499-508
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
20
-
-
34548307187
-
Using channel hopping to increase 802.11 resilience to jamming attacks
-
DOI 10.1109/INFCOM.2007.314, 4215896, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
V. Navda, A. Bohra, S. Ganguly, and D. Rubenstein, "Using channel hopping to increase 802.11 resilience to jamming attacks," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), 2007, pp. 2526,-2530. (Pubitemid 47334514)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 2526-2530
-
-
Navda, V.1
Bohra, A.2
Ganguly, S.3
Rubenstein, D.4
-
21
-
-
33748061660
-
Jamming and sensing of encrypted wireless ad hoc networks
-
Florence, Italy
-
T. Brown, J. James, and A. Sethi, "Jamming and sensing of encrypted wireless ad hoc networks," in Proc. ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), Florence, Italy, 2006.
-
(2006)
Proc. ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Brown, T.1
James, J.2
Sethi, A.3
-
22
-
-
45749134626
-
DEEJAM: Defeating energy- efficient jamming in IEEE 802.15.4-based wireless networks
-
A. D. Wood, J. A. Stankovic, and G. Zhou, "DEEJAM: Defeating energy- efficient jamming in IEEE 802.15.4-based wireless networks," in Proc. Ann. IEEE Communications Society Conf. Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2007, pp. 60-69.
-
(2007)
Proc. Ann. IEEE Communications Society Conf. Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
, pp. 60-69
-
-
Wood, A.D.1
Stankovic, J.A.2
Zhou, G.3
-
23
-
-
51649118582
-
Broadcast control channel jamming: Resilience and identification of traitors
-
A. Chan, X. Liu, G. Noubir, and B. Thapa, "Broadcast control channel jamming: Resilience and identification of traitors," in Proc. IEEE Int. Symp. Information Theory (ISIT), 2007, pp. 2496-2500.
-
(2007)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 2496-2500
-
-
Chan, A.1
Liu, X.2
Noubir, G.3
Thapa, B.4
-
24
-
-
70450202571
-
Reactive jamming attacks in multi-radio wireless sensor networks: An efficient mitigating measure by identifying trigger nodes
-
Florence, Italy
-
I. Shin, Y. Shen, Y. Xuan, M. Thai, and T. Znati, "Reactive jamming attacks in multi-radio wireless sensor networks: An efficient mitigating measure by identifying trigger nodes," in Proc. FOWANC, Florence, Italy, 2009.
-
(2009)
Proc. FOWANC
-
-
Shin, I.1
Shen, Y.2
Xuan, Y.3
Thai, M.4
Znati, T.5
-
26
-
-
77951439780
-
A novel approach to identify insider-based jamming attacks in multi-channel wireless networks
-
Orlando, FL
-
H. Nguyen, T. Pongthawornkamol, and K. Nahrstedt, "A novel approach to identify insider-based jamming attacks in multi-channel wireless networks," in Proc. IEEE MILCOM, Orlando, FL, 2009.
-
(2009)
Proc. IEEE MILCOM
-
-
Nguyen, H.1
Pongthawornkamol, T.2
Nahrstedt, K.3
|