-
2
-
-
84886591513
-
-
Agilent Technologies Rf Channel Simulator Accessed date October 2010
-
Agilent Technologies Rf Channel Simulator. http://www.home.agilent.com/ agilent/product.jspx?pn=11759C. Accessed date October 2010
-
-
-
-
3
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Bellardo J, Savage S (2003) 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: USENIX
-
(2003)
USENIX
-
-
Bellardo, J.1
Savage, S.2
-
4
-
-
0033749075
-
Performance analysis of the IEEE802
-
10.1109/49.840210
-
Bianchi G (2000) Performance analysis of the IEEE802.11 distributed coordination function. IEEE J Sel Areas Commun 18(3):535-547
-
(2000)
IEEE J Sel Areas Commun
, vol.18
, Issue.3
, pp. 535-547
-
-
Bianchi, G.1
-
5
-
-
84910117681
-
Delay analysis of IEEE 802.11 in single-hop networks
-
Carvalho MM, Garcia-Luna-Aceve JJ (2003) Delay analysis of IEEE 802.11 in single-hop networks. In: ICNP
-
(2003)
ICNP
-
-
Carvalho, M.M.1
Garcia-Luna-Aceve, J.J.2
-
6
-
-
84886590433
-
-
GNU Software Defined Radio. Accessed date November 2010
-
GNU Software Defined Radio. http://gnuradio.org/redmine/projects/ gnuradio/wiki. Accessed date November 2010
-
-
-
-
7
-
-
33847392537
-
Effect of pulse jamming on IEEE 802.11 wireless LAN performance
-
Hall M, Silvennoinen A, Häggman S-G (2005) Effect of pulse jamming on IEEE 802.11 wireless LAN performance. In: MILCOM
-
(2005)
MILCOM
-
-
Hall, M.1
Silvennoinen, A.2
Häggman, S.-G.3
-
8
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Hu YC, Perrig A, Johnson D (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: MOBICOM
-
(2002)
MOBICOM
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.3
-
9
-
-
2342576134
-
Medium access control (mac) and physical specifications
-
IEEE
-
IEEE (1999) Medium access control (mac) and physical specifications. IEEE P802.11/D10
-
(1999)
IEEE P802.11/D10
-
-
-
10
-
-
33745949686
-
Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols
-
Law YW, van Hoesel L, Doumen J, Hartel P, Havinga P (2005) Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In: SASN'05
-
(2005)
SASN'05
-
-
Law, Y.W.1
Van Hoesel, L.2
Doumen, J.3
Hartel, P.4
Havinga, P.5
-
11
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: INFOCOM
-
(2007)
INFOCOM
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
12
-
-
84886599601
-
Low-power dos attack in data wireless lans and countermeasures
-
Lin G, Noubir G (2003) Low-power dos attack in data wireless lans and countermeasures. In: MobiHoc
-
(2003)
MobiHoc
-
-
Lin, G.1
Noubir, G.2
-
13
-
-
18844450713
-
On link layer denial of service in data wireless lans
-
10.1002/wcm.221
-
Lin G, Noubir G (2004) On link layer denial of service in data wireless lans. Wirel Commun Mob Comput 5(3):273-284
-
(2004)
Wirel Commun Mob Comput
, vol.5
, Issue.3
, pp. 273-284
-
-
Lin, G.1
Noubir, G.2
-
15
-
-
0035007512
-
A power controlled multiple access protocol for wireless packet networks
-
Monks J, Bharghavan V, Hwu W (2001) A power controlled multiple access protocol for wireless packet networks. In: INFOCOM (2001)
-
(2001)
INFOCOM (2001)
-
-
Monks, J.1
Bharghavan, V.2
Hwu, W.3
-
16
-
-
84886597415
-
-
Moteiv Tmote Sky. Accessed date July 2010
-
Moteiv Tmote Sky. http://www.sentilla.com. Accessed date July 2010
-
-
-
-
17
-
-
84886585214
-
-
Multiband Atheros Driver for WiFi Accessed date May 2010
-
Multiband Atheros Driver for WiFi. http://madwifi.org/. Accessed date May 2010
-
-
-
-
20
-
-
80051912129
-
Robustness of IEEE802.11 rate adaptation algorithms against smart jamming
-
Noubir G, Rajaraman R, Sheng B, Thapa B (2011) Robustness of IEEE802.11 rate adaptation algorithms against smart jamming. In: ACM WiSec
-
(2011)
ACM WiSec
-
-
Noubir, G.1
Rajaraman, R.2
Sheng, B.3
Thapa, B.4
-
21
-
-
84886582478
-
-
Scalable Network Technologies. Accessed date July 2010
-
Scalable Network Technologies. http://www.scalable-networks.com/. Accessed date July 2010
-
-
-
-
24
-
-
34548311320
-
Intelligent jamming in wireless networks with applications to 802.11b and other networks
-
Thuente D, Acharya M (2006) Intelligent jamming in wireless networks with applications to 802.11b and other networks. In: MILCOM
-
(2006)
MILCOM
-
-
Thuente, D.1
Acharya, M.2
-
25
-
-
84886589893
-
-
Universal Software Radio Peripheral. Accessed date July 2010
-
Universal Software Radio Peripheral. http://www.ettus.com. Accessed date July 2010
-
-
-
-
26
-
-
84886592072
-
On the hidden terminal jamming problem in IEEE 802.11 mobile ad hoc networks
-
Ware C, Wysocki T, Chicharo J (2011) On the hidden terminal jamming problem in IEEE 802.11 mobile ad hoc networks. In: ICC
-
(2011)
ICC
-
-
Ware, C.1
Wysocki, T.2
Chicharo, J.3
-
27
-
-
0036793924
-
Denial of service in sensor networks
-
DOI 10.1109/MC.2002.1039518
-
Wood AD, Stankovic, JA (2002) Denial of service in sensor networks. IEEE Computer 35(10):54-62 (Pubitemid 35186161)
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
28
-
-
0036279547
-
IEEE 802.11 Distributed Coordination Function(DCF): Analysis and enhancement
-
Wu H, Cheng S, Peng Y, Long K, Ma J (2003) IEEE 802.11 distributed coordination function: enhancement and analysis. J Comput Sci Technol 18(5):605-609 (Pubitemid 34631918)
-
(2002)
IEEE International Conference on Communications
, vol.1
, pp. 605-609
-
-
Wu, H.1
Cheng, S.2
Peng, Y.3
Long, K.4
Ma, J.5
-
29
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: MOBIHOC (2005)
-
(2005)
MOBIHOC (2005)
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
30
-
-
2442582716
-
Secure ad hoc on-demand distance vector routing
-
10.1145/581291.581312
-
Zapata M, Asokan N (2002) Secure ad hoc on-demand distance vector routing. Mobile Comput Commun Rev 6(3):106-107
-
(2002)
Mobile Comput Commun Rev
, vol.6
, Issue.3
, pp. 106-107
-
-
Zapata, M.1
Asokan, N.2
|