메뉴 건너뛰기




Volumn , Issue , 2012, Pages 3-13

On the capacity of rate-adaptive packetized wireless communication links under jamming

Author keywords

Capacity; Game theory; Jamming; Rate adaptation

Indexed keywords

AVERAGE POWER; CAPACITY; CODING RATE; GAME-THEORETIC; HARDWARE AND SOFTWARE; INFORMATION-THEORETIC CAPACITY; JAMMERS; JAMMING STRATEGIES; NASH EQUILIBRIA; OPTIMAL COMMUNICATION; PURE NASH EQUILIBRIUM; RATE ADAPTATION; WIRELESS COMMUNICATION LINKS;

EID: 84860680078     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2185448.2185452     Document Type: Conference Paper
Times cited : (33)

References (49)
  • 2
    • 77953987046 scopus 로고    scopus 로고
    • A jamming-resistant mac protocol for single-hop wireless networks
    • B. Awerbuch, A. Richa, and C. Scheideler. A jamming-resistant mac protocol for single-hop wireless networks. In ACM PODC, 2008.
    • (2008) ACM PODC
    • Awerbuch, B.1    Richa, A.2    Scheideler, C.3
  • 8
    • 60149107046 scopus 로고    scopus 로고
    • Modulation rate adaptation in urban and vehicular environments: Cross-layer implementation and experimental evaluation
    • J. Camp and E. Knightly. Modulation rate adaptation in urban and vehicular environments: Cross-layer implementation and experimental evaluation. MobiCom, 2008.
    • (2008) MobiCom
    • Camp, J.1    Knightly, E.2
  • 9
    • 77953973079 scopus 로고    scopus 로고
    • Control channel jamming: Resilience and identification of traitors
    • A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming: Resilience and identification of traitors. In IEEE ISIT, 2007.
    • (2007) IEEE ISIT
    • Chan, A.1    Liu, X.2    Noubir, G.3    Thapa, B.4
  • 10
    • 37749010823 scopus 로고    scopus 로고
    • Cross-layer jamming detection and mitigation in wireless broadcast networks
    • J. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. In MobiCom, 2007.
    • (2007) MobiCom
    • Chiang, J.1    Hu, Y.-C.2
  • 14
    • 38049049434 scopus 로고    scopus 로고
    • Of malicious motes and suspicious sensors: On the effciency of malicious interference in wireless networks
    • S. Gilbert, R. Guerraoui, and C. Newport. Of malicious motes and suspicious sensors: On the effciency of malicious interference in wireless networks. In OPODIS, 2006.
    • (2006) OPODIS
    • Gilbert, S.1    Guerraoui, R.2    Newport, C.3
  • 15
    • 0034777424 scopus 로고    scopus 로고
    • A rate-adaptive mac protocol for multihop wireless networks
    • G. Holland, N. Vaidya, and V. Bahl. A rate-adaptive mac protocol for multihop wireless networks. ACM MOBICOM, 2001.
    • (2001) ACM MOBICOM
    • Holland, G.1    Vaidya, N.2    Bahl, V.3
  • 17
    • 57349189360 scopus 로고    scopus 로고
    • Efficient channel-aware rate adaptation in dynamic environments
    • G. Judd, X. Wang, and P. Steenkiste. Efficient channel-aware rate adaptation in dynamic environments. MobiSys, 2008.
    • (2008) MobiSys
    • Judd, G.1    Wang, X.2    Steenkiste, P.3
  • 18
    • 39049137564 scopus 로고    scopus 로고
    • Cara: Collision-aware rate adaptation for ieee 802.11 wlans
    • J. Kim, S. Kim, S. Choi, and D. Qiao. Cara: Collision-aware rate adaptation for ieee 802.11 wlans. INFOCOM, 2006.
    • (2006) INFOCOM
    • Kim, J.1    Kim, S.2    Choi, S.3    Qiao, D.4
  • 19
    • 77955875186 scopus 로고    scopus 로고
    • Reliable broadcast in radio networks: The bounded collision case
    • C. Koo, V. Bhandari, J. Katz, and N. Vaidya. Reliable broadcast in radio networks: The bounded collision case. In ACM PODC, 2006.
    • (2006) ACM PODC
    • Koo, C.1    Bhandari, V.2    Katz, J.3    Vaidya, N.4
  • 20
    • 23444452364 scopus 로고    scopus 로고
    • Ieee 802.11 rate adaptation: A practical approach
    • M. Lacage, M. H. Manshaei, and T. Turletti. Ieee 802.11 rate adaptation: A practical approach. ACM MSWiM, 2004.
    • (2004) ACM MSWiM
    • Lacage, M.1    Manshaei, M.H.2    Turletti, T.3
  • 22
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and network defense policies in wireless sensor networks
    • M. Li, I. Koutsopoulos, and R. Poovendran. Optimal jamming attacks and network defense policies in wireless sensor networks. In INFOCOM, 2007.
    • (2007) INFOCOM
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 24
    • 18844450713 scopus 로고    scopus 로고
    • On link layer denial of service in data wireless LANs
    • DOI 10.1002/wcm.221
    • G. Lin and G. Noubir. On link layer denial of service in data wireless lans. Wirel. Commun. Mob. Comput., 5(3):273-284, 2005. (Pubitemid 40683562)
    • (2005) Wireless Communications and Mobile Computing , vol.5 , Issue.3 , pp. 273-284
    • Lin, G.1    Noubir, G.2
  • 27
    • 0001730497 scopus 로고
    • Non-cooperative games
    • J. Nash. Non-cooperative games. Annuals of Mathematics, pages 286-295, 1951.
    • (1951) Annuals of Mathematics , pp. 286-295
    • Nash, J.1
  • 33
  • 34
    • 57349168478 scopus 로고    scopus 로고
    • Symphony: Synchronous two-phase rate power control in 802.11 wlans
    • K. Ramachandran, R. Kokku, H. Zhang, and M. Gruteser. Symphony: Synchronous two-phase rate power control in 802.11 wlans. MobiSys, 2008.
    • (2008) MobiSys
    • Ramachandran, K.1    Kokku, R.2    Zhang, H.3    Gruteser, M.4
  • 35
    • 37749043207 scopus 로고    scopus 로고
    • Secnav: Secure broadcast localization and time synchronization in wireless networks
    • K. B. Rasmussen, S. Capkun, and M. Cagalj. Secnav: secure broadcast localization and time synchronization in wireless networks. In MobiCom, 2007.
    • (2007) MobiCom
    • Rasmussen, K.B.1    Capkun, S.2    Cagalj, M.3
  • 38
    • 70450192514 scopus 로고    scopus 로고
    • Effcient uncoordinated fhss anti-jamming communication
    • M. Strasser, C. Popper, and S. Capkun. Effcient uncoordinated fhss anti-jamming communication. In MobiHoc, 2009.
    • (2009) MobiHoc
    • Strasser, M.1    Popper, C.2    Capkun, S.3
  • 39
    • 50249175122 scopus 로고    scopus 로고
    • Jamming-resistant key establishment using uncoordinated frequency hopping
    • M. Strasser, C. Popper, S. Capkun, and M. Cagalj. Jamming-resistant key establishment using uncoordinated frequency hopping. In ISSP, 2008.
    • (2008) ISSP
    • Strasser, M.1    Popper, C.2    Capkun, S.3    Cagalj, M.4
  • 41
    • 51949093106 scopus 로고    scopus 로고
    • Linear programming models for jamming attacks on network traffc ows
    • P. Tague, D. Slater, G. Noubir, and R. Poovendran. Linear programming models for jamming attacks on network traffc ows. In WiOpt, 2008.
    • (2008) WiOpt
    • Tague, P.1    Slater, D.2    Noubir, G.3    Poovendran, R.4
  • 45
    • 33751034681 scopus 로고    scopus 로고
    • Robust rate adaptation for 802.11 wireless networks
    • S. H. Wong, H. Yang, S. Lu, and V. Bharghavan. Robust rate adaptation for 802.11 wireless networks. MobiCom, 2006.
    • (2006) MobiCom
    • Wong, S.H.1    Yang, H.2    Lu, S.3    Bharghavan, V.4
  • 46
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: attack and defense strategies. IEEE Network, 2006.
    • (2006) IEEE Network
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 47
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • DOI 10.1109/MNET.2006.1637931
    • W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: attack and defense strategies. IEEE Network, 20(3):41-47, 2006. (Pubitemid 43885286)
    • (2006) IEEE Network , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 49
    • 51849119602 scopus 로고    scopus 로고
    • Defending wireless sensor networks from radio interference through channel adaptation
    • 18:1-18:34, September
    • W. Xu, W. Trappe, and Y. Zhang. Defending wireless sensor networks from radio interference through channel adaptation. ACM Transactions on Sensor Networks, 4:18:1-18:34, September 2008.
    • (2008) ACM Transactions on Sensor Networks , vol.4
    • Xu, W.1    Trappe, W.2    Zhang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.