-
1
-
-
37149048467
-
A jamming game in wireless networks with transmission cost
-
Network Control and Optimization - First EuroFGI International Conference, NET-COOP 2007, Proceedings
-
E. Altman, K. Avrachenkov, and A. Garnaev. A jamming game in wireless networks with transmission cost. Proc. The International Conference on Network Control and Optimization (NET-COOP 2007), 4465:1-12, 2007. (Pubitemid 350259792)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4465
, pp. 1-12
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
2
-
-
77953987046
-
A jamming-resistant mac protocol for single-hop wireless networks
-
B. Awerbuch, A. Richa, and C. Scheideler. A jamming-resistant mac protocol for single-hop wireless networks. In ACM PODC, 2008.
-
(2008)
ACM PODC
-
-
Awerbuch, B.1
Richa, A.2
Scheideler, C.3
-
4
-
-
51349091564
-
On the performance of ieee 802.11 under jamming
-
E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa. On the performance of ieee 802.11 under jamming. In Proceedings of IEEE INFOCOM, 2008.
-
(2008)
Proceedings of IEEE INFOCOM
-
-
Bayraktaroglu, E.1
King, C.2
Liu, X.3
Noubir, G.4
Rajaraman, R.5
Thapa, B.6
-
5
-
-
32144452400
-
Adversarial contention resolution for simple channels
-
M. A. Bender, M. Farach-Colton, S. He, B. C. Kuszmaul, and C. E. Leiserson. Adversarial contention resolution for simple channels. In SPAA, 2005.
-
(2005)
SPAA
-
-
Bender, M.A.1
Farach-Colton, M.2
He, S.3
Kuszmaul, B.C.4
Leiserson, C.E.5
-
7
-
-
80051879293
-
Fiji: Fighting implicit jamming in 802.11 wlans
-
I. Broustis, K. Pelechrinis, D. Syrivelis, S. V. Krishnamurthy, and L. Tassiulas. Fiji: Fighting implicit jamming in 802.11 wlans. SecureComm, 2009.
-
(2009)
SecureComm
-
-
Broustis, I.1
Pelechrinis, K.2
Syrivelis, D.3
Krishnamurthy, S.V.4
Tassiulas, L.5
-
8
-
-
60149107046
-
Modulation rate adaptation in urban and vehicular environments: Cross-layer implementation and experimental evaluation
-
J. Camp and E. Knightly. Modulation rate adaptation in urban and vehicular environments: Cross-layer implementation and experimental evaluation. MobiCom, 2008.
-
(2008)
MobiCom
-
-
Camp, J.1
Knightly, E.2
-
9
-
-
77953973079
-
Control channel jamming: Resilience and identification of traitors
-
A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming: Resilience and identification of traitors. In IEEE ISIT, 2007.
-
(2007)
IEEE ISIT
-
-
Chan, A.1
Liu, X.2
Noubir, G.3
Thapa, B.4
-
10
-
-
37749010823
-
Cross-layer jamming detection and mitigation in wireless broadcast networks
-
J. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. In MobiCom, 2007.
-
(2007)
MobiCom
-
-
Chiang, J.1
Hu, Y.-C.2
-
14
-
-
38049049434
-
Of malicious motes and suspicious sensors: On the effciency of malicious interference in wireless networks
-
S. Gilbert, R. Guerraoui, and C. Newport. Of malicious motes and suspicious sensors: On the effciency of malicious interference in wireless networks. In OPODIS, 2006.
-
(2006)
OPODIS
-
-
Gilbert, S.1
Guerraoui, R.2
Newport, C.3
-
15
-
-
0034777424
-
A rate-adaptive mac protocol for multihop wireless networks
-
G. Holland, N. Vaidya, and V. Bahl. A rate-adaptive mac protocol for multihop wireless networks. ACM MOBICOM, 2001.
-
(2001)
ACM MOBICOM
-
-
Holland, G.1
Vaidya, N.2
Bahl, V.3
-
16
-
-
77953998228
-
Zero pre-shared secret key establishment in the presence of jammers
-
New York, NY, USA, ACM
-
T. Jin, G. Noubir, and B. Thapa. Zero pre-shared secret key establishment in the presence of jammers. In Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, MobiHoc'09, pages 219-228, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'09
, pp. 219-228
-
-
Jin, T.1
Noubir, G.2
Thapa, B.3
-
17
-
-
57349189360
-
Efficient channel-aware rate adaptation in dynamic environments
-
G. Judd, X. Wang, and P. Steenkiste. Efficient channel-aware rate adaptation in dynamic environments. MobiSys, 2008.
-
(2008)
MobiSys
-
-
Judd, G.1
Wang, X.2
Steenkiste, P.3
-
18
-
-
39049137564
-
Cara: Collision-aware rate adaptation for ieee 802.11 wlans
-
J. Kim, S. Kim, S. Choi, and D. Qiao. Cara: Collision-aware rate adaptation for ieee 802.11 wlans. INFOCOM, 2006.
-
(2006)
INFOCOM
-
-
Kim, J.1
Kim, S.2
Choi, S.3
Qiao, D.4
-
19
-
-
77955875186
-
Reliable broadcast in radio networks: The bounded collision case
-
C. Koo, V. Bhandari, J. Katz, and N. Vaidya. Reliable broadcast in radio networks: The bounded collision case. In ACM PODC, 2006.
-
(2006)
ACM PODC
-
-
Koo, C.1
Bhandari, V.2
Katz, J.3
Vaidya, N.4
-
21
-
-
70349111445
-
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
-
New York, NY, USA, ACM
-
L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In Proceedings of the second ACM conference on Wireless network security, WiSec'09, pages 169-180, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the Second ACM Conference on Wireless Network Security, WiSec'09
, pp. 169-180
-
-
Lazos, L.1
Liu, S.2
Krunz, M.3
-
22
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
M. Li, I. Koutsopoulos, and R. Poovendran. Optimal jamming attacks and network defense policies in wireless sensor networks. In INFOCOM, 2007.
-
(2007)
INFOCOM
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
24
-
-
18844450713
-
On link layer denial of service in data wireless LANs
-
DOI 10.1002/wcm.221
-
G. Lin and G. Noubir. On link layer denial of service in data wireless lans. Wirel. Commun. Mob. Comput., 5(3):273-284, 2005. (Pubitemid 40683562)
-
(2005)
Wireless Communications and Mobile Computing
, vol.5
, Issue.3
, pp. 273-284
-
-
Lin, G.1
Noubir, G.2
-
25
-
-
80051902256
-
Thwarting inside jamming attacks on wireless broadcast communications
-
New York, NY, USA, ACM
-
S. Liu, L. Lazos, and M. Krunz. Thwarting inside jamming attacks on wireless broadcast communications. In Proceedings of the fourth ACM conference on Wireless network security, WiSec'11, pages 29-40, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the Fourth ACM Conference on Wireless Network Security, WiSec'11
, pp. 29-40
-
-
Liu, S.1
Lazos, L.2
Krunz, M.3
-
26
-
-
77953306472
-
Randomized differential dsss: Jamming-resistant wireless broadcast communication
-
Piscataway, NJ, USA, IEEE Press
-
Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential dsss: jamming-resistant wireless broadcast communication. In Proceedings of the 29th conference on Information communications, INFOCOM'10, pages 695-703, Piscataway, NJ, USA, 2010. IEEE Press.
-
(2010)
Proceedings of the 29th Conference on Information Communications, INFOCOM'10
, pp. 695-703
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
27
-
-
0001730497
-
Non-cooperative games
-
J. Nash. Non-cooperative games. Annuals of Mathematics, pages 286-295, 1951.
-
(1951)
Annuals of Mathematics
, pp. 286-295
-
-
Nash, J.1
-
29
-
-
80051912129
-
On the robustness of ieee 802.11 rate adaptation algorithms against smart jamming
-
New York, NY, USA, ACM
-
G. Noubir, R. Rajaraman, B. Sheng, and B. Thapa. On the robustness of ieee 802.11 rate adaptation algorithms against smart jamming. In Proceedings of the fourth ACM conference on Wireless network security, WiSec'11, pages 97-108, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the Fourth ACM Conference on Wireless Network Security, WiSec'11
, pp. 97-108
-
-
Noubir, G.1
Rajaraman, R.2
Sheng, B.3
Thapa, B.4
-
31
-
-
76749132821
-
Ares: An anti-jamming reinforcement system for 802.11 networks
-
New York, NY, USA, ACM
-
K. Pelechrinis, I. Broustis, S. V. Krishnamurthy, and C. Gkantsidis. Ares: an anti-jamming reinforcement system for 802.11 networks. In Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT'09, pages 181-192, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, CoNEXT'09
, pp. 181-192
-
-
Pelechrinis, K.1
Broustis, I.2
Krishnamurthy, S.V.3
Gkantsidis, C.4
-
35
-
-
37749043207
-
Secnav: Secure broadcast localization and time synchronization in wireless networks
-
K. B. Rasmussen, S. Capkun, and M. Cagalj. Secnav: secure broadcast localization and time synchronization in wireless networks. In MobiCom, 2007.
-
(2007)
MobiCom
-
-
Rasmussen, K.B.1
Capkun, S.2
Cagalj, M.3
-
38
-
-
70450192514
-
Effcient uncoordinated fhss anti-jamming communication
-
M. Strasser, C. Popper, and S. Capkun. Effcient uncoordinated fhss anti-jamming communication. In MobiHoc, 2009.
-
(2009)
MobiHoc
-
-
Strasser, M.1
Popper, C.2
Capkun, S.3
-
39
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
M. Strasser, C. Popper, S. Capkun, and M. Cagalj. Jamming-resistant key establishment using uncoordinated frequency hopping. In ISSP, 2008.
-
(2008)
ISSP
-
-
Strasser, M.1
Popper, C.2
Capkun, S.3
Cagalj, M.4
-
41
-
-
51949093106
-
Linear programming models for jamming attacks on network traffc ows
-
P. Tague, D. Slater, G. Noubir, and R. Poovendran. Linear programming models for jamming attacks on network traffc ows. In WiOpt, 2008.
-
(2008)
WiOpt
-
-
Tague, P.1
Slater, D.2
Noubir, G.3
Poovendran, R.4
-
44
-
-
80051886930
-
Short paper: Reactive jamming in wireless networks: How realistic is the threat?
-
New York, NY, USA, ACM
-
M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders. Short paper: reactive jamming in wireless networks: how realistic is the threat? In Proceedings of the fourth ACM conference on Wireless network security, WiSec'11, pages 47-52, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the Fourth ACM Conference on Wireless Network Security, WiSec'11
, pp. 47-52
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
Lenders, V.4
-
46
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: attack and defense strategies. IEEE Network, 2006.
-
(2006)
IEEE Network
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
47
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
DOI 10.1109/MNET.2006.1637931
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: attack and defense strategies. IEEE Network, 20(3):41-47, 2006. (Pubitemid 43885286)
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
48
-
-
35348897340
-
Channel surfing: Defending wireless sensor networks from interference
-
DOI 10.1145/1236360.1236423, IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
-
W. Xu, W. Trappe, and Y. Zhang. Channel surffng: defending wireless sensor networks from interference. In Proceedings of the 6th international conference on Information processing in sensor networks, IPSN'07, pages 499-508, New York, NY, USA, 2007. ACM. (Pubitemid 47582180)
-
(2007)
IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
, pp. 499-508
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
49
-
-
51849119602
-
Defending wireless sensor networks from radio interference through channel adaptation
-
18:1-18:34, September
-
W. Xu, W. Trappe, and Y. Zhang. Defending wireless sensor networks from radio interference through channel adaptation. ACM Transactions on Sensor Networks, 4:18:1-18:34, September 2008.
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
|