-
1
-
-
84904438141
-
Mimo-based jamming resilient communication in wireless networks
-
Apr./May
-
Q. Yan, H. Zeng, T. Jiang, M. Li, W. Lou, and Y. T. Hou, "Mimo-based jamming resilient communication in wireless networks," in Proc. IEEE INFOCOM, Apr./May 2014, pp. 2697-2706.
-
(2014)
Proc. IEEE INFOCOM
, pp. 2697-2706
-
-
Yan, Q.1
Zeng, H.2
Jiang, T.3
Li, M.4
Lou, W.5
Hou, Y.T.6
-
2
-
-
0036793924
-
Denial of service in sensor networks
-
Oct
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
3
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc), 2005, pp. 46-57.
-
(2005)
Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
4
-
-
77956561765
-
Detection of reactive jamming in sensor networks
-
M. Strasser, B. Danev, and S. Čapkun, "Detection of reactive jamming in sensor networks," ACM Trans. Sensor Netw., vol. 7, no. 16, 2010, Art. no. 16.
-
(2010)
ACM Trans. Sensor Netw.
, vol.7
, Issue.16
-
-
Strasser, M.1
Danev, B.2
Čapkun, S.3
-
5
-
-
80051801375
-
Denial of service attacks in wireless networks: The case of jammers
-
May
-
K. Pelechrinis, M. Iliofotou, and S. Krishnamurthy, "Denial of service attacks in wireless networks: The case of jammers," IEEE Commun. Surveys Tuts., vol. 13, no. 2, pp. 245-257, May 2011.
-
(2011)
IEEE Commun. Surveys Tuts.
, vol.13
, Issue.2
, pp. 245-257
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, S.3
-
6
-
-
80051886930
-
Reactive jamming in wireless networks: How realistic is the threat?
-
Jun
-
M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders, "reactive jamming in wireless networks: How realistic is the threat?" in Proc. WiSec, Jun. 2011, pp. 47-52.
-
(2011)
Proc. WiSec
, pp. 47-52
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
Lenders, V.4
-
7
-
-
85180418432
-
A practical, targeted, and stealthy attack against WPA enterprise authentication
-
Feb
-
A. Cassola, W. Robertson, E. Kirda, and G. Noubir, "A practical, targeted, and stealthy attack against WPA enterprise authentication," in Proc. 20th Annu. Netw. Distrib. Syst. Secur. Symp. (NDSS), Feb. 2013, pp. 1-15.
-
(2013)
Proc. 20th Annu. Netw. Distrib. Syst. Secur. Symp. (NDSS)
, pp. 1-15
-
-
Cassola, A.1
Robertson, W.2
Kirda, E.3
Noubir, G.4
-
8
-
-
44849093231
-
OFDM channel estimation with jammed pilot detector under narrow-band jamming
-
May
-
M. Han et al., "OFDM channel estimation with jammed pilot detector under narrow-band jamming," IEEE Trans. Veh. Technol., vol. 57, no. 3, pp. 1934-1939, May 2008.
-
(2008)
IEEE Trans. Veh. Technol.
, vol.57
, Issue.3
, pp. 1934-1939
-
-
Han, M.1
-
9
-
-
80052148438
-
Efficient OFDM denial: Pilot jamming and pilot nulling
-
Jun
-
T. C. Clancy, "Efficient OFDM denial: Pilot jamming and pilot nulling," in Proc. IEEE ICC, Jun. 2011, pp. 1-5.
-
(2011)
Proc. IEEE ICC
, pp. 1-5
-
-
Clancy, T.C.1
-
10
-
-
70450260680
-
Interference alignment and cancellation
-
Aug
-
S. Gollakota, S. D. Perli, and D. Katabi, "Interference alignment and cancellation," in Proc. SIGCOMM, Aug. 2009, pp. 159-170.
-
(2009)
Proc. SIGCOMM
, pp. 159-170
-
-
Gollakota, S.1
Perli, S.D.2
Katabi, D.3
-
11
-
-
80053152170
-
Clearing the RF smog: Making 802.11n robust to cross-technology interference
-
Aug
-
S. Gollakota, F. Adib, D. Katabi, and S. Seshan, "Clearing the RF smog: Making 802.11n robust to cross-technology interference," in Proc. SIGCOMM, Aug. 2011, pp. 170-181.
-
(2011)
Proc. SIGCOMM
, pp. 170-181
-
-
Gollakota, S.1
Adib, F.2
Katabi, D.3
Seshan, S.4
-
12
-
-
80053138825
-
Random access heterogeneous MIMO networks
-
Aug
-
K. C.-J. Lin, S. Gollakota, and D. Katabi, "Random access heterogeneous MIMO networks," in Proc. SIGCOMM, Aug. 2011, pp. 146-157.
-
(2011)
Proc. SIGCOMM
, pp. 146-157
-
-
Lin, K.C.-J.1
Gollakota, S.2
Katabi, D.3
-
13
-
-
80051902256
-
Thwarting inside jamming attacks on wireless broadcast communications
-
Jun
-
S. Liu, L. Lazos, and M. Krunz, "Thwarting inside jamming attacks on wireless broadcast communications," in Proc. WiSec, Jun. 2011, pp. 29-40.
-
(2011)
Proc. WiSec
, pp. 29-40
-
-
Liu, S.1
Lazos, L.2
Krunz, M.3
-
14
-
-
80051869457
-
JR-SND: Jamming-resilient secure neighbor discovery in mobile ad hoc networks
-
Jun
-
R. Zhang, Y. Zhang, and X. Huang, "JR-SND: Jamming-resilient secure neighbor discovery in mobile ad hoc networks," in Proc. ICDCS, Jun. 2011, pp. 529-538.
-
(2011)
Proc. ICDCS
, pp. 529-538
-
-
Zhang, R.1
Zhang, Y.2
Huang, X.3
-
15
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
May
-
M. Strasser, C. Popper, S. Capkun, and C. Mario, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE SP, May 2008, pp. 64-78.
-
(2008)
Proc. IEEE SP
, pp. 64-78
-
-
Strasser, M.1
Popper, C.2
Capkun, S.3
Mario, C.4
-
16
-
-
70450192514
-
Efficient uncoordinated FHSS anti-jamming communication
-
M. Strasser, C. Pöpper, and S. Čapkun, "Efficient uncoordinated FHSS anti-jamming communication," in Proc. 10th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc), 2009, pp. 207-218.
-
(2009)
Proc. 10th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc)
, pp. 207-218
-
-
Strasser, M.1
Pöpper, C.2
Čapkun, S.3
-
17
-
-
79960855950
-
Delay-bounded adaptive UFH-based anti-jamming wireless communication
-
Apr
-
Q. Wang, P. Xu, K. Ren, and X.-Y. Li, "Delay-bounded adaptive UFH-based anti-jamming wireless communication," in Proc. IEEE INFOCOM, Apr. 2011, pp. 1413-1421.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1413-1421
-
-
Wang, Q.1
Xu, P.2
Ren, K.3
Li, X.-Y.4
-
18
-
-
84855955465
-
Jamming-resistant collaborative broadcast using uncoordinated frequency hopping
-
Feb
-
L. Xiao, H. Dai, and P. Ning, "Jamming-resistant collaborative broadcast using uncoordinated frequency hopping," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 297-309, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 297-309
-
-
Xiao, L.1
Dai, H.2
Ning, P.3
-
19
-
-
85008524827
-
Thwarting control-channel jamming attacks from inside jammers
-
Sep
-
S. Liu, L. Lazos, and M. Krunz, "Thwarting control-channel jamming attacks from inside jammers," IEEE Trans. Mobile Comput., vol. 11, no. 9, pp. 1545-1558, Sep. 2012.
-
(2012)
IEEE Trans. Mobile Comput.
, vol.11
, Issue.9
, pp. 1545-1558
-
-
Liu, S.1
Lazos, L.2
Krunz, M.3
-
20
-
-
77953306472
-
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
-
Mar
-
Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized differential DSSS: Jamming-resistant wireless broadcast communication," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
21
-
-
85034799271
-
Jamming-resistant broadcast communication without shared keys
-
C. Pöpper, M. Strasser, and S. Čapkun, "Jamming-resistant broadcast communication without shared keys," in Proc. 18th Conf. USENIX Secur. Symp. (SSYM), 2009, pp. 231-248.
-
(2009)
Proc. 18th Conf. USENIX Secur. Symp. (SSYM)
, pp. 231-248
-
-
Pöpper, C.1
Strasser, M.2
Čapkun, S.3
-
22
-
-
80051912129
-
On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming
-
Jun
-
G. Noubir, R. Rajaraman, B. Sheng, and B. Thapa, "On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming," in Proc. WiSec, Jun. 2011, pp. 97-108.
-
(2011)
Proc. WiSec
, pp. 97-108
-
-
Noubir, G.1
Rajaraman, R.2
Sheng, B.3
Thapa, B.4
-
23
-
-
56749150049
-
Anti-jamming timing channels for wireless networks
-
W. Xu, W. Trqappe, and Y. Zhang, "Anti-jamming timing channels for wireless networks," in Proc. WiSec, 2008, pp. 203-213.
-
(2008)
Proc. WiSec
, pp. 203-213
-
-
Xu, W.1
Trqappe, W.2
Zhang, Y.3
-
24
-
-
84861602103
-
BitTrickle: Defending against broadband and high-power reactive jamming attacks
-
Mar
-
Y. Liu and P. Ning, "BitTrickle: Defending against broadband and high-power reactive jamming attacks," in Proc. IEEE INFOCOM, Mar. 2012, pp. 909-917.
-
(2012)
Proc. IEEE INFOCOM
, pp. 909-917
-
-
Liu, Y.1
Ning, P.2
-
25
-
-
84879544324
-
Counter-jamming using mixed mechanical and software interference cancellation
-
Apr
-
T. D. Vo-Huu, E.-O. Blass, and G. Noubir, "Counter-jamming using mixed mechanical and software interference cancellation," in Proc. WiSec, Apr. 2013, pp. 31-42.
-
(2013)
Proc. WiSec
, pp. 31-42
-
-
Vo-Huu, T.D.1
Blass, E.-O.2
Noubir, G.3
-
26
-
-
84959202314
-
User-centric view of jamming games in cognitive radio networks
-
Dec
-
L. Xiao, J. Liu, Q. Li, N. Mandayam, and H. V. Poor, "User-centric view of jamming games in cognitive radio networks," IEEE Trans. Inf. Forensics Security, vol. 10, no. 12, pp. 2578-2590, Dec. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.12
, pp. 2578-2590
-
-
Xiao, L.1
Liu, J.2
Li, Q.3
Mandayam, N.4
Poor, H.V.5
-
27
-
-
85031986809
-
Anti-jamming strategy versus a low-power jamming attack when intelligence of adversary's attack type is unknown
-
Mar
-
A. Garnaev, Y. Liu, and W. Trappe, "Anti-jamming strategy versus a low-power jamming attack when intelligence of adversary's attack type is unknown," IEEE Trans. Signal Inf. Process. Netw., vol. 2, no. 1, pp. 49-56, Mar. 2016.
-
(2016)
IEEE Trans. Signal Inf. Process. Netw.
, vol.2
, Issue.1
, pp. 49-56
-
-
Garnaev, A.1
Liu, Y.2
Trappe, W.3
-
28
-
-
84966387883
-
Jamming-resistant multiradio multi-channel opportunistic spectrum access in cognitive radio networks
-
to be published
-
Q. Wang, K. Ren, P. Ning, and S. Hu, "Jamming-resistant multiradio multi-channel opportunistic spectrum access in cognitive radio networks," IEEE Trans. Veh. Technol., to be published.
-
IEEE Trans. Veh. Technol.
-
-
Wang, Q.1
Ren, K.2
Ning, P.3
Hu, S.4
-
29
-
-
77952347741
-
Subverting MIMO wireless systems by jamming the channel estimation procedure
-
Mar
-
R. Miller and W. Trappe, "Subverting MIMO wireless systems by jamming the channel estimation procedure," in Proc. WiSec, Mar. 2010, pp. 19-24.
-
(2010)
Proc. WiSec
, pp. 19-24
-
-
Miller, R.1
Trappe, W.2
-
30
-
-
84921498554
-
MCR decoding: A MIMO approach for defending against wireless jamming attacks
-
Oct
-
W. Shen, P. Ning, X. He, H. Dai, and Y. Liu, "MCR decoding: A MIMO approach for defending against wireless jamming attacks," in Proc. IEEE CNS, Oct. 2014, pp. 133-138.
-
(2014)
Proc. IEEE CNS
, pp. 133-138
-
-
Shen, W.1
Ning, P.2
He, X.3
Dai, H.4
Liu, Y.5
-
31
-
-
84866598205
-
Rate adaptation for 802.11 multiuser MIMO networks
-
Aug
-
W.-L. Shen et al., "Rate adaptation for 802.11 multiuser MIMO networks," in Proc. MobiCom, Aug. 2012, pp. 29-40.
-
(2012)
Proc. MobiCom
, pp. 29-40
-
-
Shen, W.-L.1
-
32
-
-
60149086999
-
In-band spectrum sensing in cognitive radio networks: Energy detection or feature detection?
-
Sep
-
H. Kim and K. G. Shin, "In-band spectrum sensing in cognitive radio networks: Energy detection or feature detection?" in Proc. MobiCom, Sep. 2008, pp. 14-25.
-
(2008)
Proc. MobiCom
, pp. 14-25
-
-
Kim, H.1
Shin, K.G.2
-
33
-
-
51649103711
-
Experimental study of spectrum sensing based on energy detection and network cooperation
-
D. Cabric, A. Tkachenko, and R. W. Brodersen, "Experimental study of spectrum sensing based on energy detection and network cooperation," in Proc. 1st Int. Workshop Technol. Policy Accessing Spectr. (TAPAS), 2006, Art. no. 12.
-
(2006)
Proc. 1st Int. Workshop Technol. Policy Accessing Spectr. (TAPAS)
, vol.12
-
-
Cabric, D.1
Tkachenko, A.2
Brodersen, R.W.3
-
34
-
-
84879538680
-
Detection of reactive jamming in dsss-based wireless networks
-
D. Giustiniano, V. Lenders, J. B. Schmitt, M. Spuhler, and M. Wilhelm, "Detection of reactive jamming in dsss-based wireless networks," in Proc. 6th ACM Conf. Secur. Privacy Wireless Mobile Netw. (WiSec), 2013, pp. 43-48.
-
(2013)
Proc. 6th ACM Conf. Secur. Privacy Wireless Mobile Netw. (WiSec)
, pp. 43-48
-
-
Giustiniano, D.1
Lenders, V.2
Schmitt, J.B.3
Spuhler, M.4
Wilhelm, M.5
-
36
-
-
77955196382
-
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
-
May
-
Y. Liu, P. Ning, and H. Dai, "Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures," in Proc. IEEE SP, May 2010, pp. 286-301.
-
(2010)
Proc. IEEE SP
, pp. 286-301
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
-
37
-
-
66549100735
-
ZigZag decoding: Combating hidden terminals in wireless networks
-
Aug
-
S. Gollakota and D. Katabi, "ZigZag decoding: Combating hidden terminals in wireless networks," in Proc. SIGCOMM, Aug. 2008, pp. 159-170.
-
(2008)
Proc. SIGCOMM
, pp. 159-170
-
-
Gollakota, S.1
Katabi, D.2
-
38
-
-
84863546460
-
Enabling real-time interference alignment: Promises and challenges
-
K. Miller, A. Sanne, K. Srinivasan, and S. Vishwanath, "Enabling real-time interference alignment: Promises and challenges," in Proc. 13th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2012, pp. 55-64.
-
(2012)
Proc. 13th ACM Int. Symp. Mobile Ad Hoc Netw. Comput.
, pp. 55-64
-
-
Miller, K.1
Sanne, A.2
Srinivasan, K.3
Vishwanath, S.4
-
39
-
-
0003962619
-
-
New York, NY, USA: Perseus Publishing
-
G. C. Clark, Jr., and J. B. Cain, Error-Correction Coding for Digital Communications. New York, NY, USA: Perseus Publishing, 1981.
-
(1981)
Error-Correction Coding for Digital Communications
-
-
Clark, G.C.1
Cain, J.B.2
-
40
-
-
80051886131
-
Localizing multiple jamming attackers in wireless networks
-
Jun
-
H. Liu, Z. Liu, Y. Chen, and W. Xu, "Localizing multiple jamming attackers in wireless networks," in Proc. 31st Int. Conf. Distrib. Comput. Syst. (ICDCS), Jun. 2011, pp. 517-528.
-
(2011)
Proc. 31st Int. Conf. Distrib. Comput. Syst. (ICDCS)
, pp. 517-528
-
-
Liu, H.1
Liu, Z.2
Chen, Y.3
Xu, W.4
-
41
-
-
51349151249
-
A distributed optimization algorithm for multihop cognitive radio networks
-
Apr
-
Y. Shi and Y. T. Hou, "A distributed optimization algorithm for multihop cognitive radio networks," in Proc. IEEE INFOCOM, 27th Conf. Comput. Commun., Apr. 2008, pp. 1966-1974.
-
(2008)
Proc. IEEE INFOCOM, 27th Conf. Comput. Commun.
, pp. 1966-1974
-
-
Shi, Y.1
Hou, Y.T.2
-
42
-
-
84966339469
-
-
Online accessed Jan. 15, 2016
-
Ettus Research LLC. [Online]. Available: http://www.ettus.com/, accessed Jan. 15, 2016.
-
-
-
|