-
2
-
-
21844480681
-
Link-level measurements from an 802.11b mesh network
-
Aug.
-
D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris. Link-level measurements from an 802.11b mesh network. In Proc. of ACM SIGCOMM '04, pages 121-132, Aug. 2004.
-
(2004)
Proc. of ACM SIGCOMM '04
, pp. 121-132
-
-
Aguayo, D.1
Bicket, J.2
Biswas, S.3
Judd, G.4
Morris, R.5
-
3
-
-
77956607840
-
Jamming detection mechanisms for wireless sensor networks
-
June
-
M. Çakiroglu and A. T. Özcerit. Jamming detection mechanisms for wireless sensor networks. In Proc. of ICST InfoScale '08, pages 1-8, June 2008.
-
(2008)
Proc. of ICST InfoScale '08
, pp. 1-8
-
-
Çakiroglu, M.1
Özcerit, A.T.2
-
4
-
-
79951949189
-
Cross-layer jamming detection and mitigation in wireless broadcast networks
-
Jan.
-
J. T. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw., 19(1):286-298, Jan. 2011.
-
(2011)
IEEE/ACM Trans. Netw.
, vol.19
, Issue.1
, pp. 286-298
-
-
Chiang, J.T.1
Hu, Y.-C.2
-
5
-
-
78149302549
-
Predictable 802.11 packet delivery from wireless channel measurements
-
Aug.
-
D. Halperin, W. Hu, A. Sheth, and D. Wetherall. Predictable 802.11 packet delivery from wireless channel measurements. Proc. of ACM SIGCOMM '10, pages 159-170, Aug. 2010.
-
(2010)
Proc. of ACM SIGCOMM '10
, pp. 159-170
-
-
Halperin, D.1
Hu, W.2
Sheth, A.3
Wetherall, D.4
-
6
-
-
84861595535
-
Fast and accurate packet delivery estimation based on DSSS chip errors
-
Mar.
-
P. Heinzer, V. Lenders, and F. Legendre. Fast and accurate packet delivery estimation based on DSSS chip errors. In Proc. of IEEE INFOCOM '12, pages 2916-2920, Mar. 2012.
-
(2012)
Proc. of IEEE INFOCOM '12
, pp. 2916-2920
-
-
Heinzer, P.1
Lenders, V.2
Legendre, F.3
-
8
-
-
60449113417
-
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
-
Feb.
-
Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans. Sensor Netw., 5(1):6:1-6:38, Feb. 2009.
-
(2009)
ACM Trans. Sensor Netw.
, vol.5
, Issue.1
, pp. 61-638
-
-
Law, Y.W.1
Palaniswami, M.2
Hoesel, L.V.3
Doumen, J.4
Hartel, P.5
Havinga, P.6
-
9
-
-
81455142735
-
Packet-hiding methods for preventing selective jamming attacks
-
Jan.
-
A. Proaño and L. Lazos. Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secure Comput., 9(1):101-114, Jan. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput.
, vol.9
, Issue.1
, pp. 101-114
-
-
Proaño, A.1
Lazos, L.2
-
10
-
-
80052116812
-
Towards accurate and agile link quality estimation in wireless sensor networks
-
June
-
Y. Qin, Z. He, and T. Voigt. Towards accurate and agile link quality estimation in wireless sensor networks. In Proc. of IFIP Med-Hoc-Net '11, pages 179-185, June 2011.
-
(2011)
Proc. of IFIP Med-Hoc-Net '11
, pp. 179-185
-
-
Qin, Y.1
He, Z.2
Voigt, T.3
-
13
-
-
84893428593
-
BLITZ: Wireless link quality estimation in the dark
-
Feb.
-
M. Spuhler, V. Lenders, and D. Giustiniano. BLITZ: Wireless link quality estimation in the dark. In Proc. of EWSN '13, pages 99-114, Feb. 2013.
-
(2013)
Proc. of EWSN '13
, pp. 99-114
-
-
Spuhler, M.1
Lenders, V.2
Giustiniano, D.3
-
14
-
-
77956561765
-
Detection of reactive jamming in sensor networks
-
Aug.
-
M. Strasser, B. Danev, and S. Çapkun. Detection of reactive jamming in sensor networks. ACM Trans. Sensor Netw., 7(2):16:1-16:29, Aug. 2010.
-
(2010)
ACM Trans. Sensor Netw.
, vol.7
, Issue.2
, pp. 161-1629
-
-
Strasser, M.1
Danev, B.2
Çapkun, S.3
-
15
-
-
80051886930
-
Reactive jamming in wireless networks: How realistic is the threat?
-
June
-
M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders. Reactive jamming in wireless networks: How realistic is the threat? In Proc. of ACM WiSec '11, pages 47-52, June 2011.
-
(2011)
Proc. of ACM WiSec '11
, pp. 47-52
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
Lenders, V.4
-
16
-
-
45749134626
-
DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks
-
June
-
A. D. Wood, J. A. Stankovic, and G. Zhou. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In Proc. of IEEE SECON '07, pages 60-69, June 2007.
-
(2007)
Proc. of IEEE SECON '07
, pp. 60-69
-
-
Wood, A.D.1
Stankovic, J.A.2
Zhou, G.3
-
17
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
May
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of ACM MobiHoc '05, pages 46-57, May 2005.
-
(2005)
Proc. of ACM MobiHoc '05
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
18
-
-
84859199325
-
A trigger identification service for defending reactive jammers in WSN
-
May
-
Y. Xuan, Y. Shen, N. P. Nguyen, and M. T. Thai. A trigger identification service for defending reactive jammers in WSN. IEEE Trans. Mob. Comput., 11(5):793-806, May 2012.
-
(2012)
IEEE Trans. Mob. Comput.
, vol.11
, Issue.5
, pp. 793-806
-
-
Xuan, Y.1
Shen, Y.2
Nguyen, N.P.3
Thai, M.T.4
|