메뉴 건너뛰기




Volumn , Issue , 2013, Pages 31-42

Counter-jamming using mixed mechanical and software interference cancellation

Author keywords

Anti jamming; Beam forming; Software radio

Indexed keywords

ANTI-JAMMING; COMMERCIAL APPLICATIONS; FUNCTIONAL PROTOTYPES; INTERFERENCE CANCELLATION; ITERATIVE ALGORITHM; ORDERS OF MAGNITUDE; ROBUST COMMUNICATION; SIGNAL IDENTIFICATION;

EID: 84879544324     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2462096.2462103     Document Type: Conference Paper
Times cited : (21)

References (42)
  • 1
    • 57549097287 scopus 로고    scopus 로고
    • A jamming-resistant mac protocol for single-hop wireless networks
    • B. Awerbuch, A. Richa, and C. Scheideler. A jamming-resistant mac protocol for single-hop wireless networks. In PODC, pages 45-54, 2008.
    • (2008) PODC , pp. 45-54
    • Awerbuch, B.1    Richa, A.2    Scheideler, C.3
  • 3
    • 32844470517 scopus 로고    scopus 로고
    • Phased arrays and radars - Past, present and future
    • ISSN 01926225
    • E. Brookner. Phased arrays and radars - past, present and future. Microwave Journal, 49(1):24-46, 2006. ISSN 01926225.
    • (2006) Microwave Journal , vol.49 , Issue.1 , pp. 24-46
    • Brookner, E.1
  • 4
    • 38949138133 scopus 로고    scopus 로고
    • Phased-array radar: Past, astounding breakthroughs, and future trends
    • ISSN 01926225
    • E. Brookner. Phased-array radar: Past, astounding breakthroughs, and future trends. Microwave Journal, 51(1):30-50, 2008. ISSN 01926225.
    • (2008) Microwave Journal , vol.51 , Issue.1 , pp. 30-50
    • Brookner, E.1
  • 6
    • 85180418432 scopus 로고    scopus 로고
    • A practical, targeted, and stealthy attack against wpa enterprise authentication
    • A. Cassola, W. Robertson, E. Kirda, and G. Noubir. A practical, targeted, and stealthy attack against wpa enterprise authentication. In Proceedings of NDSS, 2013.
    • (2013) Proceedings of NDSS
    • Cassola, A.1    Robertson, W.2    Kirda, E.3    Noubir, G.4
  • 7
    • 51349125793 scopus 로고    scopus 로고
    • Dynamic jamming mitigation for wireless broadcast networks
    • J. Chiang and Y.-C. Hu. Dynamic jamming mitigation for wireless broadcast networks. In INFOCOM, pages 1211-1219, 2008.
    • (2008) INFOCOM , pp. 1211-1219
    • Chiang, J.1    Hu, Y.-C.2
  • 8
    • 78649281129 scopus 로고    scopus 로고
    • Achieving single channel, full duplex wireless communication
    • J. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti. Achieving single channel, full duplex wireless communication. In MOBICOM, pages 1-12, 2010.
    • (2010) MOBICOM , pp. 1-12
    • Choi, J.1    Jain, M.2    Srinivasan, K.3    Levis, P.4    Katti, S.5
  • 9
    • 70349146976 scopus 로고    scopus 로고
    • Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
    • J. Dong, R. Curtmola, and C. Nita-Rotaru. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. In In Proceedings of WiSec, pages 111-122, 2009.
    • (2009) Proceedings of WiSec , pp. 111-122
    • Dong, J.1    Curtmola, R.2    Nita-Rotaru, C.3
  • 10
    • 84879519414 scopus 로고    scopus 로고
    • http://transition.fcc.gov/eb/News-Releases/DOC-304575A1.html
    • FCC. Jammer enforcement, 2012. http://www.fcc.gov/encyclopedia/jammer- enforcement, http://transition.fcc.gov/eb/News-Releases/DOC-304575A1.html.
    • (2012) Jammer Enforcement
  • 11
    • 38049049434 scopus 로고    scopus 로고
    • Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks
    • S. Gilbert, R. Guerraoui, and C. Newport. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In OPODIS, 2006.
    • (2006) OPODIS
    • Gilbert, S.1    Guerraoui, R.2    Newport, C.3
  • 12
    • 77958042149 scopus 로고    scopus 로고
    • GNU. Gnu radio. http://www.gnuradio.org.
    • Gnu Radio
  • 13
    • 80053135174 scopus 로고    scopus 로고
    • They can hear your heartbeats: Non-invasive security for implantable medical devices
    • S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: Non-invasive security for implantable medical devices. In SIGCOMM, pages 2-13, 2011.
    • (2011) SIGCOMM , pp. 2-13
    • Gollakota, S.1    Hassanieh, H.2    Ransford, B.3    Katabi, D.4    Fu, K.5
  • 16
    • 77953998228 scopus 로고    scopus 로고
    • Zero pre-shared secret key establishment in the presence of jammers
    • T. Jin, G. Noubir, and B. Thapa. Zero pre-shared secret key establishment in the presence of jammers. In In Proceedings of ACM MobiHoc, pages 219-228, 2009.
    • (2009) Proceedings of ACM MobiHoc , pp. 219-228
    • Jin, T.1    Noubir, G.2    Thapa, B.3
  • 17
    • 33748678899 scopus 로고    scopus 로고
    • Reliable broadcast in radio networks: The bounded collision case
    • C. Koo, V. Bhandari, J. Katz, and N. Vaidya. Reliable broadcast in radio networks: The bounded collision case. In PODC, pages 258-264, 2006.
    • (2006) PODC , pp. 258-264
    • Koo, C.1    Bhandari, V.2    Katz, J.3    Vaidya, N.4
  • 18
    • 84859022001 scopus 로고    scopus 로고
    • Mcgraw Hill Higher Education; 3rd edition
    • J.-D. Kraus. Antennas. Mcgraw Hill Higher Education; 3rd edition, 2001.
    • (2001) Antennas
    • Kraus, J.-D.1
  • 19
    • 78751527470 scopus 로고    scopus 로고
    • Defending dsss-based broadcast communication against insider jammers via delayed seed-disclosure
    • A. Liu, P. Ning, H. Dai, Y. Liu, and C. Wang. Defending dsss-based broadcast communication against insider jammers via delayed seed-disclosure. In Proceedings of ACSAC'2010, 2010.
    • (2010) Proceedings of ACSAC'2010
    • Liu, A.1    Ning, P.2    Dai, H.3    Liu, Y.4    Wang, C.5
  • 20
    • 80051902256 scopus 로고    scopus 로고
    • Thwarting inside jamming attacks on wireless broadcast communications
    • S. Liu, L. Lazos, and M. Krunz. Thwarting inside jamming attacks on wireless broadcast communications. In In Proceedings of ACM WiSec, pages 29-40, 2011.
    • (2011) Proceedings of ACM WiSec , pp. 29-40
    • Liu, S.1    Lazos, L.2    Krunz, M.3
  • 21
    • 77953306472 scopus 로고    scopus 로고
    • Randomized differential dsss: Jamming-resistant wireless broadcast communication
    • Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential dsss: jamming-resistant wireless broadcast communication. In INFOCOM, pages 695-703, 2010.
    • (2010) INFOCOM , pp. 695-703
    • Liu, Y.1    Ning, P.2    Dai, H.3    Liu, A.4
  • 31
    • 70349110082 scopus 로고    scopus 로고
    • A coding-theoretic approach for efficient message verification over insecure channels
    • D. Slater, P. Tague, R. Poovendran, and B. J. Matt. A coding-theoretic approach for efficient message verification over insecure channels. In Proceeding of ACM WiSec, 2009.
    • (2009) Proceeding of ACM WiSec
    • Slater, D.1    Tague, P.2    Poovendran, R.3    Matt, B.J.4
  • 37
    • 84879509587 scopus 로고    scopus 로고
    • uPrint. Uprint plus. http://www.uprint3dprinting.com/.
    • Uprint Plus
  • 40
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: attack and defense strategies. IEEE Network, 20(3):41-47, 2006.
    • (2006) IEEE Network , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 41
    • 35348897340 scopus 로고    scopus 로고
    • Channel surfing: Defending wireless sensor networks from interference
    • W. Xu, W. Trappe, and Y. Zhang. Channel surfing: defending wireless sensor networks from interference. In Proceedings of IPSN, 2007.
    • (2007) Proceedings of IPSN
    • Xu, W.1    Trappe, W.2    Zhang, Y.3
  • 42
    • 84155172323 scopus 로고    scopus 로고
    • A hierarchical ight planning framework for air trafic management
    • W. Zhang, M. Kamgarpour, D. Sun, and C. Tomlin. A hierarchical ight planning framework for air trafic management. Proceedings of the IEEE, 100(1), 2012.
    • (2012) Proceedings of the IEEE , vol.100 , Issue.1
    • Zhang, W.1    Kamgarpour, M.2    Sun, D.3    Tomlin, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.