메뉴 건너뛰기




Volumn 9, Issue 6, 2012, Pages 852-864

Jamming-resilient multipath routing

Author keywords

jamming; routing algorithms; Wireless networks

Indexed keywords

AD HOC NETWORKS; GENETIC ALGORITHMS; JAMMING; ROUTING ALGORITHMS; WIRELESS NETWORKS;

EID: 84866605768     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2012.69     Document Type: Article
Times cited : (41)

References (36)
  • 2
    • 33845635202 scopus 로고    scopus 로고
    • Wormhole-based antijamming techniques in sensor networks
    • DOI 10.1109/TMC.2007.250674
    • M. Cagalj, S. Capkun, and J. Hubaux, "Wormhole-Based Anti- Jamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing, vol. 6, no. 1, pp. 100-114, June 2007. (Pubitemid 44955817)
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.1 , pp. 100-114
    • Cagalj, M.1    Capkun, S.2    Hubaux, J.-P.3
  • 5
    • 51349125793 scopus 로고    scopus 로고
    • Dynamic jamming mitigation for wireless broadcast networks
    • J.T. Chiang and Y.-C. Hu, "Dynamic Jamming Mitigation for Wireless Broadcast Networks," Proc. IEEE INFOCOM, 2008.
    • (2008) Proc. IEEE INFOCOM
    • Chiang, J.T.1    Hu, Y.-C.2
  • 7
    • 80054075293 scopus 로고    scopus 로고
    • Exploiting jamming- caused neighbor changes for jammer localization
    • Mar
    • Z. Liu, H. Liu, W. Xu, and Y. Chen, "Exploiting Jamming- Caused Neighbor Changes for Jammer Localization," IEEE Trans. Pattern and Distributed Systems, vol. 23, no. 3, pp. 547-555, Mar. 2012.
    • (2012) IEEE Trans. Pattern and Distributed Systems , vol.23 , Issue.3 , pp. 547-555
    • Liu, Z.1    Liu, H.2    Xu, W.3    Chen, Y.4
  • 8
    • 4444237581 scopus 로고    scopus 로고
    • Spread: Enhancing data confidentiality in mobile ad hoc networks
    • W. Lou, W. Liu, and Y. Fang, "Spread: Enhancing Data Confidentiality in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2004.
    • (2004) Proc. IEEE INFOCOM
    • Lou, W.1    Liu, W.2    Fang, Y.3
  • 14
    • 84866615729 scopus 로고    scopus 로고
    • U. O. W. Network Security Lab. Jamming Framework, Univ. of Washington
    • U. O. W. Network Security Lab, "Jamming Framework for ns-3," Jamming Framework, Univ. of Washington, 2010.
    • (2010) Jamming Framework for ns-3
  • 15
    • 29844445404 scopus 로고    scopus 로고
    • Low-power DoS attacks in data wireless lans and countermeasures
    • G. Noubir and G. Lin, "Low-Power DoS Attacks in Data Wireless Lans and Countermeasures," SIGMOBILE Mobile Computing and Comm. Rev., vol. 7, no. 3, pp. 29-30, 2003.
    • (2003) SIGMOBILE Mobile Computing and Comm. Rev. , vol.7 , Issue.3 , pp. 29-30
    • Noubir, G.1    Lin, G.2
  • 16
    • 0031353437 scopus 로고    scopus 로고
    • A highly adaptive distributed routing algorithm for mobile wireless networks
    • V. Park and M. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," Proc. IEEE INFOCOM, 1997.
    • (1997) Proc. IEEE INFOCOM
    • Park, V.1    Corson, M.2
  • 17
    • 84891657889 scopus 로고    scopus 로고
    • A new implementation of yen's ranking loopless paths algorithm
    • M. Pascoal and E. Martins, "A New Implementation of Yen's Ranking Loopless Paths Algorithm," 4OR: Quarterly J. Operations Research, vol. 1, pp. 121-133, 2003.
    • (2003) 4OR: Quarterly J. Operations Research , vol.1 , pp. 121-133
    • Pascoal, M.1    Martins, E.2
  • 22
    • 79951947094 scopus 로고    scopus 로고
    • Jamming- aware traffic allocation for multiple-path routing using portfolio selection
    • Feb
    • P. Tague, S. Nabar, J. Ritcey, and R. Poovendran, "Jamming- Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection," IEEE Trans. Networking, vol. 19, no. 1, pp. 184-194, Feb. 2011.
    • (2011) IEEE Trans. Networking , vol.19 , Issue.1 , pp. 184-194
    • Tague, P.1    Nabar, S.2    Ritcey, J.3    Poovendran, R.4
  • 24
    • 2342588224 scopus 로고    scopus 로고
    • Analysis of multipath routingpart I: The effect on the packet delivery ratio
    • Jan
    • A. Tsirigos and Z. Haas, "Analysis of Multipath Routingpart I: The Effect on the Packet Delivery Ratio," Proc. IEEE Trans. Wireless Comm., vol. 3, no. 1, pp. 136-146, Jan. 2004.
    • (2004) Proc. Rfsti IEEE Trans. Wireless Comm. , vol.3 , Issue.1 , pp. 136-146
    • Tsirigos, A.1    Haas, Z.2
  • 25
    • 0042976102 scopus 로고    scopus 로고
    • Cooperative packet caching and shortest multipath routing in mobile ad hoc networks
    • A. Valera, W.K.G. Seah, and S. Rao, "Cooperative Packet Caching and Shortest Multipath Routing in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2003.
    • (2003) Proc. IEEE INFOCOM
    • Valera, A.1    Seah, W.K.G.2    Rao, S.3
  • 31
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. MobiHoc, 2005.
    • (2005) Proc. MobiHoc
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 32
    • 34748832212 scopus 로고    scopus 로고
    • Source selectable path diversity via routing deflections
    • X. Yang and D. Wetherall, "Source Selectable Path Diversity via Routing Deflections," Proc. ACM SIGCOMM, 2006.
    • (2006) Proc. ACM SIGCOMM
    • Yang, X.1    Wetherall, D.2
  • 36
    • 79551639512 scopus 로고    scopus 로고
    • Correlation-resilient path selection for multi-path routing
    • X. Zhang and A. Perrig, "Correlation-Resilient Path Selection for Multi-Path Routing," Proc. IEEE Globecom, 2010.
    • (2010) Proc. IEEE Globecom
    • Zhang, X.1    Perrig, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.