-
2
-
-
42149164305
-
A multi-channel defense against jamming attacks in wireless sensor networks
-
Chania, Crete Island, Greece
-
Alnifie, G. and Simon, R. (2007) 'A multi-channel defense against jamming attacks in wireless sensor networks', Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, pp. 95-104.
-
(2007)
Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks
, pp. 95-104
-
-
Alnifie, G.1
Simon, R.2
-
3
-
-
77951180510
-
MULEPRO: A multi-channel response to jamming attacks in wireless sensor networks
-
Alnifie, G. and Simon, R. (2010) 'MULEPRO: a multi-channel response to jamming attacks in wireless sensor networks', Wireless Communications and Mobile Computing, Vol. 10, No. 5, pp. 704-721.
-
(2010)
Wireless Communications and Mobile Computing
, vol.10
, Issue.5
, pp. 704-721
-
-
Alnifie, G.1
Simon, R.2
-
4
-
-
57549097287
-
A jammingresistant mac protocol for single-hop wireless networks
-
ACM
-
Awerbuch, B., Richa, A. and Scheideler, C. (2008) 'A jammingresistant mac protocol for single-hop wireless networks', Proceedings of the Twenty-Seventh ACM Symposium on Principles of Distributed Computing, ACM, pp. 45-54.
-
(2008)
Proceedings of the Twenty-seventh ACM Symposium on Principles of Distributed Computing
, pp. 45-54
-
-
Awerbuch, B.1
Richa, A.2
Scheideler, C.3
-
5
-
-
57549113108
-
On the performance of IEEE 802.11 under jamming
-
Phoenix, AZ, USA
-
Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R. and Thapa, B. (2008) 'On the performance of IEEE 802.11 under jamming', IEEE the 27th Conference on Computer Communications, Phoenix, AZ, USA, pp. 1265-1273.
-
(2008)
IEEE the 27th Conference on Computer Communications
, pp. 1265-1273
-
-
Bayraktaroglu, E.1
King, C.2
Liu, X.3
Noubir, G.4
Rajaraman, R.5
Thapa, B.6
-
6
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Washington, DC, USA
-
Bellardo, J. and Savage, S. (2003) '802.11 denial-of-service attacks: real vulnerabilities and practical solutions', Proceedings of the 12th Conference on USENIX Security Symposium, Washington, DC, USA, pp. 15-28.
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
7
-
-
51149088302
-
Weighted centroid localization in zigbee-based sensor networks
-
University of Alcala, Alcala de Henares, Spain
-
Blumenthal, J., Grossmann, R., Golatowski, F. and Timmermann, D. (2007) 'Weighted centroid localization in zigbee-based sensor networks', IEEE International Symposium on Intelligent Signal Processing, University of Alcala, Alcala de Henares, Spain, pp. 1-6.
-
(2007)
IEEE International Symposium on Intelligent Signal Processing
, pp. 1-6
-
-
Blumenthal, J.1
Grossmann, R.2
Golatowski, F.3
Timmermann, D.4
-
8
-
-
77955147796
-
FIJI: Fighting implicit jamming in 802.11 WLANs
-
Broustis, I., Pelechrinis, K., Syrivelis, D., Krishnamurthy, S. V. and Tassiulas, L. (2009) 'FIJI: fighting implicit jamming in 802.11 WLANs', Security and Privacy in Communication Networks, Vol. 19, pp. 21-40.
-
(2009)
Security and Privacy in Communication Networks
, vol.19
, pp. 21-40
-
-
Broustis, I.1
Pelechrinis, K.2
Syrivelis, D.3
Krishnamurthy, S.V.4
Tassiulas, L.5
-
9
-
-
0034291601
-
Gps-less low-cost outdoor localization for very small devices
-
Bulusu, N., Heidemann, J. and Estrin, D. (2000) 'Gps-less low-cost outdoor localization for very small devices', IEEE Personal Communications, Vol. 7, No. 5, pp. 28-34.
-
(2000)
IEEE Personal Communications
, vol.7
, Issue.5
, pp. 28-34
-
-
Bulusu, N.1
Heidemann, J.2
Estrin, D.3
-
10
-
-
33845635202
-
Wormholebased antijamming techniques in sensor networks
-
Cagalj, M., Capkun, S. and Hubaux, J. P. (2007) 'Wormholebased antijamming techniques in sensor networks', Mobile Computing, IEEE Transactions on, Vol. 6, No. 1, pp. 100-114.
-
(2007)
Mobile Computing, IEEE Transactions on
, vol.6
, Issue.1
, pp. 100-114
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.P.3
-
11
-
-
84860703303
-
An algorithm for jammer localization in wireless sensor networks
-
Cheng, T., Li, P. and Zhu, S. (2012) 'An algorithm for jammer localization in wireless sensor networks', Advanced Information Networking and Applications (AINA), 2012 IEEE 26th International Conference on, IEEE, pp. 724-731.
-
(2012)
Advanced Information Networking and Applications (AINA), 2012 IEEE 26th International Conference On, IEEE
, pp. 724-731
-
-
Cheng, T.1
Li, P.2
Zhu, S.3
-
12
-
-
79951949189
-
Cross-layer jamming detection and mitigation in wireless broadcast networks
-
Chiang, J. T. and Hu, Y. C. (2011) 'Cross-layer jamming detection and mitigation in wireless broadcast networks', IEEE/ACM Transactions on Networking, Vol. 19, No. 1, pp. 286-298.
-
(2011)
IEEE/ACM Transactions on Networking
, vol.19
, Issue.1
, pp. 286-298
-
-
Chiang, J.T.1
Hu, Y.C.2
-
13
-
-
35448949166
-
Jamming communication networks under complete uncertainty
-
Commander, C. W., Pardalos, P. M., Ryabchenko, V, Shylo, O. V, Uryasev, S. and Zrazhevsky, G. (2008) 'Jamming communication networks under complete uncertainty', Optimization Letters, Vol. 2, No. 1, pp. 53-70.
-
(2008)
Optimization Letters
, vol.2
, Issue.1
, pp. 53-70
-
-
Commander, C.W.1
Pardalos, P.M.2
Ryabchenko, V.3
Shylo, O.V.4
Uryasev, S.5
Zrazhevsky, G.6
-
14
-
-
84952096957
-
A generalization of the poisson distribution
-
Consul, P. and Jain, G. (1973) 'A generalization of the poisson distribution', Technometrics, Vol. 15, No. 4, pp. 791-799.
-
(1973)
Technometrics
, vol.15
, Issue.4
, pp. 791-799
-
-
Consul, P.1
Jain, G.2
-
15
-
-
39749099322
-
A decision support system for locating VHF/UHF radio jammer systems on the terrain
-
Gencer, C, Aydogan, E. K. and Celik, C. (2008) 'A decision support system for locating VHF/UHF radio jammer systems on the terrain', Information Systems Frontiers, Vol. 10, No. 1, pp. 111-124.
-
(2008)
Information Systems Frontiers
, vol.10
, Issue.1
, pp. 111-124
-
-
Gencer, C.1
Aydogan, E.K.2
Celik, C.3
-
17
-
-
77949462958
-
Understanding and mitigating the impact of RF interference on 802.11 networks
-
Kyoto, Japan
-
Gummadi, R., Wetherall, D., Greenstein, B. and Seshan, S. (2007) 'Understanding and mitigating the impact of RF interference on 802.11 networks', Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan, pp. 385-396.
-
(2007)
Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 385-396
-
-
Gummadi, R.1
Wetherall, D.2
Greenstein, B.3
Seshan, S.4
-
18
-
-
70449499500
-
Detection of jamming attacks in wireless ad hoc networks using error distribution
-
Hamieh, A. and Ben-Othman, J. (2009) 'Detection of jamming attacks in wireless ad hoc networks using error distribution', IEEE International Conference on Communications, 2009. ICC'09, IEEE, pp. 1-6
-
(2009)
IEEE International Conference on Communications, 2009. ICC'09, IEEE
, pp. 1-6
-
-
Hamieh, A.1
Ben-Othman, J.2
-
19
-
-
84919801666
-
-
Tech. Rep., DTIC Document
-
Huang, H., Ahmed, N. and Pullurul, S. (2010) Jamming Dust: A Low-Power Distributed Jammer Network, Tech. Rep., DTIC Document.
-
(2010)
Jamming Dust: A Low-power Distributed Jammer Network
-
-
Huang, H.1
Ahmed, N.2
Pullurul, S.3
-
20
-
-
70350554437
-
A hybrid model of defense techniques against base station jamming attack in wireless sensor networks
-
Indore, India
-
Jain, S. K. and Garg, K. (2009) 'A hybrid model of defense techniques against base station jamming attack in wireless sensor networks', Proceedings of the 2009 First International Conference on Computational Intelligence, Communication Systems and Networks, Indore, India, pp. 102-107.
-
(2009)
Proceedings of the 2009 First International Conference on Computational Intelligence, Communication Systems and Networks
, pp. 102-107
-
-
Jain, S.K.1
Garg, K.2
-
21
-
-
84883209701
-
Feasibility analysis of controller design for adaptive channel hopping'
-
Pisa, Italy
-
Kerkez, B., Watteyne, T, Magliocco, M., Glaser, S. and Pister, K. (2009) Feasibility analysis of controller design for adaptive channel hopping', Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, Pisa, Italy, pp. 76:1-76:6.
-
(2009)
Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools
, pp. 761-766
-
-
Kerkez, B.1
Watteyne, T.2
Magliocco, M.3
Glaser, S.4
Pister, K.5
-
22
-
-
70249103556
-
Jamming mitigation in multi-radio wireless networks: Reactive or proactive?
-
Istanbul, Turkey
-
Khattab, S., Mosse, D. and Melhem, R. (2008a) 'Jamming mitigation in multi-radio wireless networks: reactive or proactive?', Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey, pp. 27:1-27:10.
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Networks
, pp. 271-2710
-
-
Khattab, S.1
Mosse, D.2
Melhem, R.3
-
23
-
-
84923172059
-
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
-
Dublin, Ireland
-
Khattab, S., Mosse, D. and Melhem, R. (2008b) 'Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks', Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, Dublin, Ireland, pp. 25:1-25:10.
-
(2008)
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
, pp. 251-2510
-
-
Khattab, S.1
Mosse, D.2
Melhem, R.3
-
24
-
-
0004169020
-
-
Springer, The Netherlands
-
Laarhoven, P. V. and Aarts, E. H. (1987) Simulated Annealing: Theory and Applications, Springer, The Netherlands, Vol. 37, pp. 7-15.
-
(1987)
Simulated Annealing: Theory and Applications
, vol.37
, pp. 7-15
-
-
Laarhoven, P.V.1
Aarts, E.H.2
-
25
-
-
60449113417
-
Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols
-
Law, Y. W., Palaniswami, M., Hoesel, L. V, Doumen, J., Hartel, P. and Havinga, P. (2009) 'Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols', ACM Transactions on Sensor Networks (TOSN), Vol. 5, No. 1, p. 6.
-
(2009)
ACM Transactions on Sensor Networks (TOSN)
, vol.5
, Issue.1
, pp. 6
-
-
Law, Y.W.1
Palaniswami, M.2
Hoesel, L.V.3
Doumen, J.4
Hartel, P.5
Havinga, P.6
-
26
-
-
70349111445
-
Mitigating controlchannel jamming attacks in multi-channel ad hoc networks
-
Zurich, Switzerland
-
Lazos, L., Liu, S. and Krunz, M. (2009) 'Mitigating controlchannel jamming attacks in multi-channel ad hoc networks', Proceedings of the 2nd ACM Conference on Wireless Network Security, Zurich, Switzerland, pp. 169-180.
-
(2009)
Proceedings of the 2nd ACM Conference on Wireless Network Security
, pp. 169-180
-
-
Lazos, L.1
Liu, S.2
Krunz, M.3
-
27
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
Anchorage, AK
-
Li, M., Koutsopoulos, I. and Poovendran, R. (2007) 'Optimal jamming attacks and network defense policies in wireless sensor networks', IEEE 26th IEEE International Conference on Computer Communications, Anchorage, AK, pp. 1307-1315.
-
(2007)
IEEE 26th IEEE International Conference on Computer Communications
, pp. 1307-1315
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
28
-
-
70349334200
-
Localizing jammers in wireless networks
-
March, Galveston, Texas
-
Liu, H., Wenyuan, X., Chen, Y. and Liu, Z. (2009) 'Localizing jammers in wireless networks', IEEE International Conference on Pervasive Computing and Communications, March, Galveston, Texas, pp. 1-6.
-
(2009)
IEEE International Conference on Pervasive Computing and Communications
, pp. 1-6
-
-
Liu, H.1
Wenyuan, X.2
Chen, Y.3
Liu, Z.4
-
29
-
-
79951516546
-
Determining the position of a jammer using a virtual-force iterative approach
-
Liu, H., Liu, Z., Chen, Y. and Xu, W. (2011) 'Determining the position of a jammer using a virtual-force iterative approach', Wireless Networks, Vol. 17, No. 2, pp. 531-547.
-
(2011)
Wireless Networks
, vol.17
, Issue.2
, pp. 531-547
-
-
Liu, H.1
Liu, Z.2
Chen, Y.3
Xu, W.4
-
30
-
-
77953306472
-
Randomized differential dsss: Jamming-resistant wireless broadcast communication
-
San Diego, CA, USA
-
Liu, Y., Ning, P., Dai, H. and Liu, A. (2010) 'Randomized differential dsss: jamming-resistant wireless broadcast communication', INFOCOM, 2010 Proceedings IEEE, IEEE, San Diego, CA, USA, pp. 1-9.
-
(2010)
INFOCOM, 2010 Proceedings IEEE, IEEE
, pp. 1-9
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
31
-
-
80054075293
-
Exploiting jamming-caused neighbor changes for jammer localization
-
Liu, Z., Liu, H., Xu, W. and Chen, Y. (2012a) 'Exploiting jamming-caused neighbor changes for jammer localization. IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 3, pp. 547-555.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.3
, pp. 547-555
-
-
Liu, Z.1
Liu, H.2
Xu, W.3
Chen, Y.4
-
32
-
-
84863544689
-
Extracting jamming signals to locate radio interferers and jammers
-
ACM, Hilton Head, SC, USA
-
Liu, Z., Liu, H., Xu, W. and Chen, Y. (2012b) 'Extracting jamming signals to locate radio interferers and jammers', Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM, Hilton Head, SC, USA, pp. 257-258.
-
(2012)
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 257-258
-
-
Liu, Z.1
Liu, H.2
Xu, W.3
Chen, Y.4
-
33
-
-
79960859827
-
From jammer to gambler: Modeling and detection of jamming attacks against timecritical traffic
-
Lu, Z., Wang, W. and Wang, C. (2011) 'From jammer to gambler: modeling and detection of jamming attacks against timecritical traffic', INFOCOM 2011 Proceedings, IEEE, IEEE, pp. 1871-1879.
-
(2011)
INFOCOM 2011 Proceedings, IEEE, IEEE
, pp. 1871-1879
-
-
Lu, Z.1
Wang, W.2
Wang, C.3
-
34
-
-
77951710463
-
Information warfareworthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system
-
Misra, S., Singh, R. and Mohan, S. V. R. (2010) 'Information warfareworthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system', Sensors, Vol. 10, pp. 3444-3479.
-
(2010)
Sensors
, vol.10
, pp. 3444-3479
-
-
Misra, S.1
Singh, R.2
Mohan, S.V.R.3
-
35
-
-
44349090820
-
Defending wireless sensor networks from jamming attacks
-
Mpitziopoulos, A., Gavalas, D., Pantziou, G. and Konstantopoulos, C. (2007) 'Defending wireless sensor networks from jamming attacks', IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1-5.
-
(2007)
IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications
, pp. 1-5
-
-
Mpitziopoulos, A.1
Gavalas, D.2
Pantziou, G.3
Konstantopoulos, C.4
-
36
-
-
72949104155
-
A survey on jamming attacks and countermeasures in WSNs
-
Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C. and Pantziou, G. (2009) 'A survey on jamming attacks and countermeasures in WSNs', IEEE Communications Surveys Tutorials, Vol. 11, No. 4, pp. 42-56.
-
(2009)
IEEE Communications Surveys Tutorials
, vol.11
, Issue.4
, pp. 42-56
-
-
Mpitziopoulos, A.1
Gavalas, D.2
Konstantopoulos, C.3
Pantziou, G.4
-
37
-
-
33747378828
-
Jamming attack detection and countermeasures in wireless sensor network using ant system
-
Muraleedharan, R. and Osadciw, L. A. (2006) 'Jamming attack detection and countermeasures in wireless sensor network using ant system', SPIE the International Society for Optical Engineering, Vol. 6248, p. 62480G.
-
(2006)
SPIE the International Society for Optical Engineering
, vol.6248
, pp. 62480G
-
-
Muraleedharan, R.1
Osadciw, L.A.2
-
38
-
-
34548307187
-
Using channel hopping to increase 802.11 resilience to jamming attacks
-
Anchorage, AK
-
Navda, V., Bohra, A., Ganguly, S. and Rubenstein, D. (2007) 'Using channel hopping to increase 802.11 resilience to jamming attacks', IEEE 26th IEEE International Conference on Computer Communications, Anchorage, AK, pp. 2526-2530.
-
(2007)
IEEE 26th IEEE International Conference on Computer Communications
, pp. 2526-2530
-
-
Navda, V.1
Bohra, A.2
Ganguly, S.3
Rubenstein, D.4
-
39
-
-
77951273083
-
On limited-range strategic/random jamming attacks in wireless ad hoc networks
-
Zurich, Switzerland
-
Panyim, K., Hayajneh, T., Krishnamurthy, P. and Tipper, D. (2009) 'On limited-range strategic/random jamming attacks in wireless ad hoc networks', Local Computer Networks, 2009. LCN 2009. IEEE 34th Conference on, IEEE, Zurich, Switzerland, pp. 922-929.
-
(2009)
Local Computer Networks, 2009. LCN 2009. IEEE 34th Conference On, IEEE
, pp. 922-929
-
-
Panyim, K.1
Hayajneh, T.2
Krishnamurthy, P.3
Tipper, D.4
-
40
-
-
74349113521
-
Gaming the jammer: Is frequency hopping effective?
-
Seoul, Korea
-
Pelechrinis, K., Koufogiannakis, C. and Krishnamurthy, S. V. (2009a) 'Gaming the jammer: is frequency hopping effective?', Proceedings of the 7th International Conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Seoul, Korea, pp. 187-196.
-
(2009)
Proceedings of the 7th International Conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
, pp. 187-196
-
-
Pelechrinis, K.1
Koufogiannakis, C.2
Krishnamurthy, S.V.3
-
41
-
-
77951563736
-
Lightweight jammer localization in wireless networks: System design and implementation
-
Honolulu, Hawaii
-
Pelechrinis, K., Koutsopoulos, I., Broustis, I. and Krishnamurthy, S. (2009b) 'Lightweight jammer localization in wireless networks: System design and implementation', IEEE Global Telecommunications Conference, Honolulu, Hawaii, pp. 1-6.
-
(2009)
IEEE Global Telecommunications Conference
, pp. 1-6
-
-
Pelechrinis, K.1
Koutsopoulos, I.2
Broustis, I.3
Krishnamurthy, S.4
-
42
-
-
77957890222
-
On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks
-
Pelechrinis, K., Koufogiannakis, C. and Krishnamurthy, S. (2010) 'On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks', IEEE Transactions on Wireless Communications, Vol. 9, No. 10, pp. 3258-3271.
-
(2010)
IEEE Transactions on Wireless Communications
, vol.9
, Issue.10
, pp. 3258-3271
-
-
Pelechrinis, K.1
Koufogiannakis, C.2
Krishnamurthy, S.3
-
43
-
-
80051801375
-
Denial of service attacks in wireless networks: The case of jammers
-
Pelechrinis, K., Iliofotou, M. and Krishnamurthy, S. (2011) 'Denial of service attacks in wireless networks: the case of jammers', IEEE Communications Surveys Tutorials, Vol. 13, No. 2, pp. 245-257.
-
(2011)
IEEE Communications Surveys Tutorials
, vol.13
, Issue.2
, pp. 245-257
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, S.3
-
44
-
-
78649863202
-
A jamming-resistant mac protocol for multi-hop wireless networks
-
Richa, A., Scheideler, C., Schmid, S. and Zhang, J. (2010) 'A jamming-resistant mac protocol for multi-hop wireless networks', Distributed Computing, pp. 179-193.
-
(2010)
Distributed Computing
, pp. 179-193
-
-
Richa, A.1
Scheideler, C.2
Schmid, S.3
Zhang, J.4
-
45
-
-
84863552416
-
Optimization schemes for protective jamming
-
Hilton Head, SC, USA
-
Sankararaman, S., Abu-Affash, K., Efrat, A., Eriksson-Bique, S., Polishchuk, V., Ramasubramanian, S. and Segal, M. (2012) 'Optimization schemes for protective jamming', Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM, Hilton Head, SC, USA, pp. 65-74.
-
(2012)
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM
, pp. 65-74
-
-
Sankararaman, S.1
Abu-Affash, K.2
Efrat, A.3
Eriksson-Bique, S.4
Polishchuk, V.5
Ramasubramanian, S.6
Segal, M.7
-
46
-
-
70450202571
-
Reactive jamming attacks in multi-radio wireless sensor networks: An efficient mitigating measure by identifying trigger nodes
-
New Orleans, USA
-
Shin, I., Shen, Y., Xuan, Y., Thai, M. T. and Znati, T. (2009) 'Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes', Proceedings of the 2nd ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, New Orleans, USA, pp. 87-96.
-
(2009)
Proceedings of the 2nd ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing
, pp. 87-96
-
-
Shin, I.1
Shen, Y.2
Xuan, Y.3
Thai, M.T.4
Znati, T.5
-
47
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
Oakland, CA, USA
-
Strasser, M., Capkun, S., Popper, C. and Cagalj, M. (2008) 'Jamming-resistant key establishment using uncoordinated frequency hopping', Security and Privacy, 2008. SP 2008. IEEE Symposium on, IEEE, Oakland, CA, USA, pp. 64-78.
-
(2008)
Security and Privacy, 2008. SP 2008. IEEE Symposium On, IEEE
, pp. 64-78
-
-
Strasser, M.1
Capkun, S.2
Popper, C.3
Cagalj, M.4
-
48
-
-
77956561765
-
Detection of reactive jamming in sensor networks
-
Strasser, M., Danev, B. and Čapkun, S. (2010) 'Detection of reactive jamming in sensor networks', ACM Transactions on Sensor Networks, Vol. 7, No. 2, pp. 16:1-16:29.
-
(2010)
ACM Transactions on Sensor Networks
, vol.7
, Issue.2
, pp. 161-1629
-
-
Strasser, M.1
Danev, B.2
Čapkun, S.3
-
49
-
-
84919816499
-
Jammer localization in wireless sensor networks
-
Beijing, China
-
Sun, Y. and Wang, X. (2009) 'Jammer localization in wireless sensor networks', 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, China, pp. 1-4.
-
(2009)
5th International Conference on Wireless Communications, Networking and Mobile Computing
, pp. 1-4
-
-
Sun, Y.1
Wang, X.2
-
50
-
-
51949093106
-
Linear programming models for jamming attacks on network traffic flows
-
Berlin, Germany
-
Tague, P., Slater, D., Poovendran, R. and Noubir, G. (2008) 'Linear programming models for jamming attacks on network traffic flows', 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, Berlin, Germany, pp. 207-216.
-
(2008)
6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops
, pp. 207-216
-
-
Tague, P.1
Slater, D.2
Poovendran, R.3
Noubir, G.4
-
51
-
-
70449377631
-
Game theoretic modeling of jamming attacks in ad hoc networks
-
San Francisco, CA, USA
-
Thamilarasu, G. and Sridhar, R. (2009) 'Game theoretic modeling of jamming attacks in ad hoc networks', Proceedings of 18th Internatonal Conference on Computer Communications and Networks, San Francisco, CA, USA, pp. 1-6.
-
(2009)
Proceedings of 18th Internatonal Conference on Computer Communications and Networks
, pp. 1-6
-
-
Thamilarasu, G.1
Sridhar, R.2
-
52
-
-
79952988760
-
Spectrally efficient jamming mitigation based on code-controlled frequency hopping
-
Wang, H., Zhang, L., Li, T. and Tugnait, J. (2011) 'Spectrally efficient jamming mitigation based on code-controlled frequency hopping', IEEE Transactions on Wireless Communications, Vol. 10, No. 3, pp. 728-732.
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, Issue.3
, pp. 728-732
-
-
Wang, H.1
Zhang, L.2
Li, T.3
Tugnait, J.4
-
53
-
-
80051886930
-
Short paper: Reactive jamming in wireless networks: How realistic is the threat?
-
Hamburg, Germany
-
Wilhelm, M., Martinovic, I., Schmitt, J. B. and Lenders, V. (2011) 'Short paper: reactive jamming in wireless networks: how realistic is the threat? ', Proceedings of the Fourth ACM Conference on Wireless Network Security, Hamburg, Germany, pp. 47-52.
-
(2011)
Proceedings of the Fourth ACM Conference on Wireless Network Security
, pp. 47-52
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
Lenders, V.4
-
55
-
-
0348195762
-
JAM: A jammed-area mapping service for sensor networks
-
Cancun, Mexico
-
Wood, A., Stankovic, J. and Son, S. (2003) 'JAM: a jammed-area mapping service for sensor networks', 24th IEEE Real-Time Systems Symposium, Cancun, Mexico, pp. 286-297.
-
(2003)
24th IEEE Real-time Systems Symposium
, pp. 286-297
-
-
Wood, A.1
Stankovic, J.2
Son, S.3
-
56
-
-
45749134626
-
DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks
-
San Diego, CA, USA
-
Wood, A., Stankovic, J. and Zhou, G. (2007) 'DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks', 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Diego, CA, USA, pp. 60-69.
-
(2007)
4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
, pp. 60-69
-
-
Wood, A.1
Stankovic, J.2
Zhou, G.3
-
57
-
-
84855955465
-
Jamming-resistant collaborative broadcast using uncoordinated frequency hopping
-
Xiao, L., Dai, H. and Ning, P. (2012) 'Jamming-resistant collaborative broadcast using uncoordinated frequency hopping', Information Forensics and Security, IEEE Transactions on, Vol. 7, No. 1, pp. 297-309.
-
(2012)
Information Forensics and Security, IEEE Transactions on
, vol.7
, Issue.1
, pp. 297-309
-
-
Xiao, L.1
Dai, H.2
Ning, P.3
-
58
-
-
11244260535
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
Philadelphia, PA, USA
-
Xu, W., Wood, T., Trappe, W. and Zhang, Y. (2004) 'Channel surfing and spatial retreats: defenses against wireless denial of service', Proceedings of the 3rd ACM Workshop on Wireless Security, Philadelphia, PA, USA, pp. 80-89.
-
(2004)
Proceedings of the 3rd ACM Workshop on Wireless Security
, pp. 80-89
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
-
59
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
Xu, W., Trappe, W., Zhang, Y. and Wood, T. (2005) 'The feasibility of launching and detecting jamming attacks in wireless networks', Proceedings of the 6th ACM International Symposiumon Mobile Ad Hoc Networking and Computing, pp. 46-57.
-
(2005)
Proceedings of the 6th ACM International Symposiumon Mobile Ad Hoc Networking and Computing
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
60
-
-
77955354372
-
Adaptive channel hopping for interference robust wireless sensor networks
-
Cape Town, South Africa
-
Yoon, S. U., Murawski, R., Ekici, E., Park, S. and Mir, Z. (2010) 'Adaptive channel hopping for interference robust wireless sensor networks', 2010 IEEE International Conference on Communications, Cape Town, South Africa, pp. 1-5.
-
(2010)
2010 IEEE International Conference on Communications
, pp. 1-5
-
-
Yoon, S.U.1
Murawski, R.2
Ekici, E.3
Park, S.4
Mir, Z.5
|