-
2
-
-
80051801375
-
Denial of service attacks in wireless networks: The case of jammers
-
May
-
K. Pelechrinis, M. Iliofotou, and S. Krishnamurthy, "Denial of service attacks in wireless networks: The case of jammers," IEEE/ACM IEEE Communication Surveys and Tutorials, vol. 13, no. 2, pp. 245-257, May 2011.
-
(2011)
IEEE/ACM IEEE Communication Surveys and Tutorials
, vol.13
, Issue.2
, pp. 245-257
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, S.3
-
4
-
-
77956607840
-
Jamming detection mechanisms for wireless sensor networks
-
M. Çakiroǧlu and A. T. Özcerit, "Jamming detection mechanisms for wireless sensor networks," in Proc. 3rd International Conference on Scalable Information Systems (InfoScale'08), Vico Equense, Italy, 2008, pp. 1-8.
-
Proc. 3rd International Conference on Scalable Information Systems (InfoScale'08), Vico Equense, Italy, 2008
, pp. 1-8
-
-
Çakiroǧlu, M.1
Özcerit, A.T.2
-
5
-
-
37749010823
-
Cross-layer jamming detection and mitigation in wireless broadcast networks
-
J. T. Chiang and Y.-C. Hu, "Cross-layer jamming detection and mitigation in wireless broadcast networks," in Proc. 13th Annual ACM International Conference on Mobile Computing and Networking (MobiCom'07), Montréal, Québec, Canada, 2007, pp. 346-349.
-
Proc. 13th Annual ACM International Conference on Mobile Computing and Networking (MobiCom'07), Montréal, Québec, Canada, 2007
, pp. 346-349
-
-
Chiang, J.T.1
Hu, Y.-C.2
-
6
-
-
33750825847
-
DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots
-
DOI 10.1109/TMC.2006.183, 1717438
-
M. Raya, I. Aad, J.-P. Hubaux, and A. El Fawal, "DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots," IEEE Transactions on Mobile Computing, vol. 5, no. 12, pp. 1691-1705, Dec. 2006. (Pubitemid 44711828)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.12
, pp. 1691-1705
-
-
Raya, M.1
Aad, I.2
Hubaux, J.-P.3
El, F.A.4
-
7
-
-
11244260535
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
W. Xu, T. Wood, W. Trappe, and Y. Zhang, "Channel surfing and spatial retreats: Defenses against wireless denial of service," in Proc. of the ACM Workshop on Wireless Security, Philadelphia, PA, Oct. 2004.
-
Proc. of the ACM Workshop on Wireless Security, Philadelphia, PA, Oct. 2004
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
-
8
-
-
79951947094
-
Jamming-aware traffic allocation for multiple-path routing using portfolio selection
-
Feb.
-
P. Tague, S. Nabar, J. A. Ritcey, and R. Poovendran, "Jamming-aware traffic allocation for multiple-path routing using portfolio selection," IEEE/ACM Transactions on Networking, vol. 19, no. 1, pp. 184-194, Feb. 2011.
-
(2011)
IEEE/ACM Transactions on Networking
, vol.19
, Issue.1
, pp. 184-194
-
-
Tague, P.1
Nabar, S.2
Ritcey, J.A.3
Poovendran, R.4
-
9
-
-
51949113065
-
Intelligent jamming in wireless networks with applications to 802.11b and other networks
-
D. J. Thuente and M. Acharya, "Intelligent jamming in wireless networks with applications to 802.11b and other networks," in Proc. 25th IEEE Communications Society Military Communications Conference (MILCOM'06), Washington, DC, Oct. 2006, pp. 1-7.
-
Proc. 25th IEEE Communications Society Military Communications Conference (MILCOM'06), Washington, DC, Oct. 2006
, pp. 1-7
-
-
Thuente, D.J.1
Acharya, M.2
-
10
-
-
80051886930
-
Reactive jamming in wireless networks: How realistic is the threat?
-
M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders, "Reactive jamming in wireless networks: How realistic is the threat?" in Proc. 4th ACM Conference on Wireless Network Security, Hamburg, Germany, Jun. 2011.
-
Proc. 4th ACM Conference on Wireless Network Security, Hamburg, Germany, Jun. 2011
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.3
Lenders, V.4
-
11
-
-
84862124470
-
Mitigation of periodic jamming in a spread spectrum system by adaptive filter selection
-
B. DeBruhl and P. Tague, "Mitigation of periodic jamming in a spread spectrum system by adaptive filter selection," in 2nd International Conf. on Pervasive and Embedded Computing and Communication Systems (PECCS), Rome, Italy, Feb. 2012.
-
2nd International Conf. on Pervasive and Embedded Computing and Communication Systems (PECCS), Rome, Italy, Feb. 2012
-
-
DeBruhl, B.1
Tague, P.2
-
12
-
-
74349113521
-
Gaming the jammer: Is frequency hopping effective?
-
K. Pelechrinis, C. Koufogiannakis, and S. V. Krishnamurthy, "Gaming the jammer: Is frequency hopping effective?" in Proc. 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'09), Seoul, Korea, Jun. 2009.
-
Proc. 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'09), Seoul, Korea, Jun. 2009
-
-
Pelechrinis, K.1
Koufogiannakis, C.2
Krishnamurthy, S.V.3
-
13
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. ACM 6th International Symposium on Mobile Ad Hoc Networking and Computing, Urbana-Champaign, IL, USA, May 2005, pp. 46-57.
-
Proc. ACM 6th International Symposium on Mobile Ad Hoc Networking and Computing, Urbana-Champaign, IL, USA, May 2005
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
14
-
-
80051886131
-
Localizing multiple jamming attackers in wireless networks
-
H. Liu, Z. Liu, Y. Chen, and W. Xu, "Localizing multiple jamming attackers in wireless networks," in Proc. of Int'l Conf. on Distributed Computing Systems, 2011.
-
Proc. of Int'l Conf. on Distributed Computing Systems, 2011
-
-
Liu, H.1
Liu, Z.2
Chen, Y.3
Xu, W.4
-
16
-
-
57549097287
-
A jamming-resistant mac protocol for single-hop wireless networks
-
B. Awerbuch, A. Richa, and C. Scheideler, "A jamming-resistant mac protocol for single-hop wireless networks," in Proc. of the 27th ACM symposium on Principles of distributed computing, Toronto, Canada, 2008.
-
Proc. of the 27th ACM Symposium on Principles of Distributed Computing, Toronto, Canada, 2008
-
-
Awerbuch, B.1
Richa, A.2
Scheideler, C.3
-
17
-
-
51949093106
-
Linear programming models for jamming attacks on network traffic flows
-
P. Tague, D. Slater, G. Noubir, and R. Poovendran, "Linear programming models for jamming attacks on network traffic flows," in Proc. 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'08), Berlin, Germany, Apr. 2008, pp. 207-216.
-
Proc. 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'08), Berlin, Germany, Apr. 2008
, pp. 207-216
-
-
Tague, P.1
Slater, D.2
Noubir, G.3
Poovendran, R.4
-
19
-
-
80052803399
-
-
"IEEE 802.15.4-2006," http://standards.ieee.org/getieee802/ download/802.15.4-2006.pdf.
-
IEEE 802.15.4-2006
-
-
-
20
-
-
80052995743
-
Digital filter design for jamming mitigation in 802.15.4 communication
-
B. DeBruhl and P. Tague, "Digital filter design for jamming mitigation in 802.15.4 communication," in Proc. International Conference on Computer communications and Networks, Maui, Hawaii, Aug. 2011.
-
Proc. International Conference on Computer Communications and Networks, Maui, Hawaii, Aug. 2011
-
-
DeBruhl, B.1
Tague, P.2
-
22
-
-
77958042149
-
-
"GNU radio," http://gnuradio.org/.
-
GNU Radio
-
-
-
23
-
-
70450255158
-
An experimental study of network performance impact of increased latency in software defined radios
-
T. Schmid, O. Sekkat, and M. Srivastava, "An experimental study of network performance impact of increased latency in software defined radios," in Proc. 2nd ACM workshop on Wireless network testbeds, experimental evaluation and characterization, Montreal, Quebec, Canada, 2007.
-
Proc. 2nd ACM Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization, Montreal, Quebec, Canada, 2007
-
-
Schmid, T.1
Sekkat, O.2
Srivastava, M.3
|