메뉴 건너뛰기




Volumn 18, Issue 5, 2013, Pages 678-696

Performance of IEEE 802.11 under jamming

Author keywords

IEEE 802.11; jamming; medium access control; network resilience; wireless network

Indexed keywords

DISCRETE TIME MARKOV CHAINS; EXTENSIVE SIMULATIONS; IEEE 802.11 MAC PROTOCOLS; IEEE 802.11S; NETWORK RESILIENCE; REAL-WORLD PERFORMANCE; SATURATION THROUGHPUT; SOFTWARE-DEFINED RADIOS;

EID: 84886588199     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11036-011-0340-4     Document Type: Article
Times cited : (62)

References (30)
  • 2
    • 84886591513 scopus 로고    scopus 로고
    • Agilent Technologies Rf Channel Simulator Accessed date October 2010
    • Agilent Technologies Rf Channel Simulator. http://www.home.agilent.com/ agilent/product.jspx?pn=11759C. Accessed date October 2010
  • 3
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Bellardo J, Savage S (2003) 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: USENIX
    • (2003) USENIX
    • Bellardo, J.1    Savage, S.2
  • 4
    • 0033749075 scopus 로고    scopus 로고
    • Performance analysis of the IEEE802
    • 10.1109/49.840210
    • Bianchi G (2000) Performance analysis of the IEEE802.11 distributed coordination function. IEEE J Sel Areas Commun 18(3):535-547
    • (2000) IEEE J Sel Areas Commun , vol.18 , Issue.3 , pp. 535-547
    • Bianchi, G.1
  • 5
    • 84910117681 scopus 로고    scopus 로고
    • Delay analysis of IEEE 802.11 in single-hop networks
    • Carvalho MM, Garcia-Luna-Aceve JJ (2003) Delay analysis of IEEE 802.11 in single-hop networks. In: ICNP
    • (2003) ICNP
    • Carvalho, M.M.1    Garcia-Luna-Aceve, J.J.2
  • 6
    • 84886590433 scopus 로고    scopus 로고
    • GNU Software Defined Radio. Accessed date November 2010
    • GNU Software Defined Radio. http://gnuradio.org/redmine/projects/ gnuradio/wiki. Accessed date November 2010
  • 7
    • 33847392537 scopus 로고    scopus 로고
    • Effect of pulse jamming on IEEE 802.11 wireless LAN performance
    • Hall M, Silvennoinen A, Häggman S-G (2005) Effect of pulse jamming on IEEE 802.11 wireless LAN performance. In: MILCOM
    • (2005) MILCOM
    • Hall, M.1    Silvennoinen, A.2    Häggman, S.-G.3
  • 8
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Hu YC, Perrig A, Johnson D (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: MOBICOM
    • (2002) MOBICOM
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.3
  • 9
    • 2342576134 scopus 로고    scopus 로고
    • Medium access control (mac) and physical specifications
    • IEEE
    • IEEE (1999) Medium access control (mac) and physical specifications. IEEE P802.11/D10
    • (1999) IEEE P802.11/D10
  • 10
    • 33745949686 scopus 로고    scopus 로고
    • Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols
    • Law YW, van Hoesel L, Doumen J, Hartel P, Havinga P (2005) Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In: SASN'05
    • (2005) SASN'05
    • Law, Y.W.1    Van Hoesel, L.2    Doumen, J.3    Hartel, P.4    Havinga, P.5
  • 11
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and network defense policies in wireless sensor networks
    • Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: INFOCOM
    • (2007) INFOCOM
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 12
    • 84886599601 scopus 로고    scopus 로고
    • Low-power dos attack in data wireless lans and countermeasures
    • Lin G, Noubir G (2003) Low-power dos attack in data wireless lans and countermeasures. In: MobiHoc
    • (2003) MobiHoc
    • Lin, G.1    Noubir, G.2
  • 13
    • 18844450713 scopus 로고    scopus 로고
    • On link layer denial of service in data wireless lans
    • 10.1002/wcm.221
    • Lin G, Noubir G (2004) On link layer denial of service in data wireless lans. Wirel Commun Mob Comput 5(3):273-284
    • (2004) Wirel Commun Mob Comput , vol.5 , Issue.3 , pp. 273-284
    • Lin, G.1    Noubir, G.2
  • 15
    • 0035007512 scopus 로고    scopus 로고
    • A power controlled multiple access protocol for wireless packet networks
    • Monks J, Bharghavan V, Hwu W (2001) A power controlled multiple access protocol for wireless packet networks. In: INFOCOM (2001)
    • (2001) INFOCOM (2001)
    • Monks, J.1    Bharghavan, V.2    Hwu, W.3
  • 16
    • 84886597415 scopus 로고    scopus 로고
    • Moteiv Tmote Sky. Accessed date July 2010
    • Moteiv Tmote Sky. http://www.sentilla.com. Accessed date July 2010
  • 17
    • 84886585214 scopus 로고    scopus 로고
    • Multiband Atheros Driver for WiFi Accessed date May 2010
    • Multiband Atheros Driver for WiFi. http://madwifi.org/. Accessed date May 2010
  • 20
    • 80051912129 scopus 로고    scopus 로고
    • Robustness of IEEE802.11 rate adaptation algorithms against smart jamming
    • Noubir G, Rajaraman R, Sheng B, Thapa B (2011) Robustness of IEEE802.11 rate adaptation algorithms against smart jamming. In: ACM WiSec
    • (2011) ACM WiSec
    • Noubir, G.1    Rajaraman, R.2    Sheng, B.3    Thapa, B.4
  • 21
    • 84886582478 scopus 로고    scopus 로고
    • Scalable Network Technologies. Accessed date July 2010
    • Scalable Network Technologies. http://www.scalable-networks.com/. Accessed date July 2010
  • 24
    • 34548311320 scopus 로고    scopus 로고
    • Intelligent jamming in wireless networks with applications to 802.11b and other networks
    • Thuente D, Acharya M (2006) Intelligent jamming in wireless networks with applications to 802.11b and other networks. In: MILCOM
    • (2006) MILCOM
    • Thuente, D.1    Acharya, M.2
  • 25
    • 84886589893 scopus 로고    scopus 로고
    • Universal Software Radio Peripheral. Accessed date July 2010
    • Universal Software Radio Peripheral. http://www.ettus.com. Accessed date July 2010
  • 26
    • 84886592072 scopus 로고    scopus 로고
    • On the hidden terminal jamming problem in IEEE 802.11 mobile ad hoc networks
    • Ware C, Wysocki T, Chicharo J (2011) On the hidden terminal jamming problem in IEEE 802.11 mobile ad hoc networks. In: ICC
    • (2011) ICC
    • Ware, C.1    Wysocki, T.2    Chicharo, J.3
  • 27
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • DOI 10.1109/MC.2002.1039518
    • Wood AD, Stankovic, JA (2002) Denial of service in sensor networks. IEEE Computer 35(10):54-62 (Pubitemid 35186161)
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 29
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: MOBIHOC (2005)
    • (2005) MOBIHOC (2005)
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 30
    • 2442582716 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector routing
    • 10.1145/581291.581312
    • Zapata M, Asokan N (2002) Secure ad hoc on-demand distance vector routing. Mobile Comput Commun Rev 6(3):106-107
    • (2002) Mobile Comput Commun Rev , vol.6 , Issue.3 , pp. 106-107
    • Zapata, M.1    Asokan, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.