메뉴 건너뛰기




Volumn , Issue , 2012, Pages 123-145

Robust wireless infrastructure against jamming attacks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84884103108     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-0-12-415815-3.00006-6     Document Type: Chapter
Times cited : (2)

References (47)
  • 1
    • 51849119602 scopus 로고    scopus 로고
    • Defending wireless sensor networks from radio interference through channel adaptation
    • Xu W., Trappe W., Zhang Y. Defending wireless sensor networks from radio interference through channel adaptation. ACM Trans. Sens. Netw. 2008, 4:18:1-18:34. http://doi.acm.org/10.1145/1387663.1387664.
    • (2008) ACM Trans. Sens. Netw. , vol.4
    • Xu, W.1    Trappe, W.2    Zhang, Y.3
  • 10
    • 84885701483 scopus 로고    scopus 로고
    • Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks
    • Springer, Berlin, Heidelberg
    • Gilbert S., Guerraoui R., Newport C. of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. Principles of Distributed Systems, Lecture Notes in Computer Science 2006, vol. 4305:215-229. Springer, Berlin, Heidelberg. http://dx.doi.org/10.1007/11945529_16,10.1007/1194552916.
    • (2006) Principles of Distributed Systems, Lecture Notes in Computer Science , vol.4305 , pp. 215-229
    • Gilbert, S.1    Guerraoui, R.2    Newport, C.3
  • 14
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • Xu W., Ma K., Trappe W., Zhang Y. Jamming sensor networks: Attack and defense strategies. IEEE Netw. 2006, 20(3):41-47.
    • (2006) IEEE Netw. , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 19
    • 84884110833 scopus 로고    scopus 로고
    • SNT: Scalable Network Technologies: Qualnet.
    • SNT: Scalable Network Technologies: Qualnet.
  • 24
    • 0036670170 scopus 로고    scopus 로고
    • Mobility increases the capacity of ad hoc wireless networks
    • Grossglauser M., Tse D.N.C. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. Netw. 2002, 10(4):477-486.
    • (2002) IEEE/ACM Trans. Netw. , vol.10 , Issue.4 , pp. 477-486
    • Grossglauser, M.1    Tse, D.N.C.2
  • 25
    • 29844445404 scopus 로고    scopus 로고
    • Low-power dos attacks in data wireless lans and countermeasures
    • Noubir G., Lin G. Low-power dos attacks in data wireless lans and countermeasures. ACM SIGMOBILE Mob. Comput. Commun. Rev.(MC2R) 2003, 7(3):29-30.
    • (2003) ACM SIGMOBILE Mob. Comput. Commun. Rev.(MC2R) , vol.7 , Issue.3 , pp. 29-30
    • Noubir, G.1    Lin, G.2
  • 36
    • 0002021736 scopus 로고
    • Equilibrium points in n-person games
    • Nash J. Equilibrium points in n-person games. Proc. Natl Acad. Sci. 1950, 36(1):48-49.
    • (1950) Proc. Natl Acad. Sci. , vol.36 , Issue.1 , pp. 48-49
    • Nash, J.1
  • 41
    • 0033356104 scopus 로고    scopus 로고
    • Adaptive link layer strategies for energy efficient wireless networking
    • Lettieri P., Schurgers C., Srivastava M.B. Adaptive link layer strategies for energy efficient wireless networking. Wirel. Netw. 1999, 5:339-355.
    • (1999) Wirel. Netw. , vol.5 , pp. 339-355
    • Lettieri, P.1    Schurgers, C.2    Srivastava, M.B.3
  • 42
    • 0032659919 scopus 로고    scopus 로고
    • An adaptive algorithm for optimizing the packet size used
    • Modiano E. An adaptive algorithm for optimizing the packet size used. Wirel. Netw. 1999, 279-286.
    • (1999) Wirel. Netw. , pp. 279-286
    • Modiano, E.1
  • 44
    • 33745920005 scopus 로고    scopus 로고
    • Improving goodput of the ieee 802.11 mac protocol by using congestion control methods
    • Ci S., Sharif H., Noubir G. Improving goodput of the ieee 802.11 mac protocol by using congestion control methods. Int. J. Wirel. Opt. Commun. (IJWOC) 2004, 1(2):165-177.
    • (2004) Int. J. Wirel. Opt. Commun. (IJWOC) , vol.1 , Issue.2 , pp. 165-177
    • Ci, S.1    Sharif, H.2    Noubir, G.3
  • 45


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.