메뉴 건너뛰기




Volumn 2, Issue 1, 2016, Pages 49-56

Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary's Attack Type is Unknown

Author keywords

Ad hoc networks; Bayes methods; jamming

Indexed keywords

AD HOC NETWORKS; DISTRIBUTED COMPUTER SYSTEMS; LINEAR PROGRAMMING; PEER TO PEER NETWORKS; SECURITY SYSTEMS;

EID: 85031986809     PISSN: None     EISSN: 2373776X     Source Type: Journal    
DOI: 10.1109/TSIPN.2015.2506038     Document Type: Article
Times cited : (47)

References (38)
  • 2
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • Feb.
    • H. Yang, H. Y. Luo, F. Ye, S. W. Lu, and L. Zhang, "Security in mobile ad hoc networks: challenges and solutions," IEEE Wireless Commun., vol. 11, no. 1, pp. 38-47, Feb. 2004.
    • (2004) IEEE Wireless Commun. , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.Y.2    Ye, F.3    Lu, S.W.4    Zhang, L.5
  • 6
    • 84924125001 scopus 로고    scopus 로고
    • Jamming attack defense
    • H. C. A. Tilborg and S. Jajodia, Eds., New York, NY, USA: Springer
    • W. Xu, "Jamming attack defense," in Encyclopedia of Cryptography and Security, H. C. A. Tilborg and S. Jajodia, Eds., New York, NY, USA: Springer, 2011, pp. 655-661.
    • (2011) Encyclopedia of Cryptography and Security , pp. 655-661
    • Xu, W.1
  • 7
    • 84855466075 scopus 로고    scopus 로고
    • Anti-jamming games in multi-channel cognitive radio networks
    • Jan.
    • Y. Wu, B. Wang, K. J. R. Liu, and T. C. Clancy, "Anti-jamming games in multi-channel cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 30, no. 1, pp. 4-15, Jan. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.1 , pp. 4-15
    • Wu, Y.1    Wang, B.2    Liu, K.J.R.3    Clancy, T.C.4
  • 11
    • 50649125455 scopus 로고    scopus 로고
    • Game theoretic modeling of malicious users in collaborative networks
    • Sep.
    • G. Theodorakopoulos and J. S. Baras, "Game theoretic modeling of malicious users in collaborative networks," IEEE J. Sel. Areas Commun., vol. 26, no. 7, pp. 1317-1327, Sep. 2008.
    • (2008) IEEE J. Sel. Areas Commun. , vol.26 , Issue.7 , pp. 1317-1327
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 13
    • 84904708169 scopus 로고    scopus 로고
    • Incorporating attacktype uncertainty into network protection
    • Aug.
    • A. Garnaev, M. Baykal-Gursoy, and H. V. Poor, "Incorporating attacktype uncertainty into network protection," IEEE Trans. Inf. Forensics Secur., vol. 9, no. 8, pp. 1278-1287, Aug. 2014.
    • (2014) IEEE Trans. Inf. Forensics Secur. , vol.9 , Issue.8 , pp. 1278-1287
    • Garnaev, A.1    Baykal-Gursoy, M.2    Poor, H.V.3
  • 15
    • 63749110244 scopus 로고    scopus 로고
    • A game-theoretic analysis of denial of service attacks in wireless random access
    • Y. E. Sagduyu and A. Ephremidess, "A game-theoretic analysis of denial of service attacks in wireless random access," J. Wireless Netw., vol. 15, pp. 651-666, 2009.
    • (2009) J. Wireless Netw. , vol.15 , pp. 651-666
    • Sagduyu, Y.E.1    Ephremidess, A.2
  • 16
    • 84924182115 scopus 로고    scopus 로고
    • Anti-jamming strategies: A stochastic game approach
    • Game Theory for Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering), R. Aguero, T. Zinner, R. Goleva, A. Timm-Giel, and P. Tran-Gia, Eds. New York, NY, USA: Springer
    • A. Garnaev and W. Trappe, "Anti-jamming strategies: A stochastic game approach," in Mobile Networks and Management, Game Theory for Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering), vol. 141, R. Aguero, T. Zinner, R. Goleva, A. Timm-Giel, and P. Tran-Gia, Eds. New York, NY, USA: Springer, 2015, pp. 230-243.
    • (2015) Mobile Networks and Management , vol.141 , pp. 230-243
    • Garnaev, A.1    Trappe, W.2
  • 17
    • 84942474598 scopus 로고    scopus 로고
    • Security games with unknown adversarial strategies
    • Sep., to be published
    • A. Garnaev, M. Baykal-Gursoy, and H. V. Poor, "Security games with unknown adversarial strategies," IEEE Trans. Cybern., Sep. 2015, doi: 10.1109/TCYB.2015.2475243, to be published.
    • (2015) IEEE Trans. Cybern.
    • Garnaev, A.1    Baykal-Gursoy, M.2    Poor, H.V.3
  • 19
    • 79956100559 scopus 로고    scopus 로고
    • Jamming in wireless networks under uncertainty
    • E. Altman, K. Avrachenkov, and A. Garnaev, "Jamming in wireless networks under uncertainty," Mobile Netw. Appl., vol. 16, no. 2, pp. 246-254, 2011.
    • (2011) Mobile Netw. Appl. , vol.16 , Issue.2 , pp. 246-254
    • Altman, E.1    Avrachenkov, K.2    Garnaev, A.3
  • 21
    • 80051717392 scopus 로고    scopus 로고
    • Jamming games in wireless networks with incomplete information
    • Aug.
    • Y. E. Sagduyu, R. A. Berry, and A. Ephremides, "Jamming games in wireless networks with incomplete information," IEEE Commun. Mag., vol. 49, no. 8, pp. 112-118, Aug. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.8 , pp. 112-118
    • Sagduyu, Y.E.1    Berry, R.A.2    Ephremides, A.3
  • 24
    • 84877655292 scopus 로고    scopus 로고
    • Dependence of optimal monitoring strategy on the application to be protected
    • A. Garnaev, W. Trappe, and C.-T. Kung, "Dependence of optimal monitoring strategy on the application to be protected," in Proc. IEEE Global Commun. Conf. (GLOBECOM), 2012, pp. 1054-1059.
    • (2012) Proc. IEEE Global Commun. Conf. (GLOBECOM) , pp. 1054-1059
    • Garnaev, A.1    Trappe, W.2    Kung, C.-T.3
  • 26
    • 84921456908 scopus 로고    scopus 로고
    • Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence
    • A. Garnaev and W. Trappe, "Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence," in Proc. IEEE Conf. Commun. Netw. Secur. (CNS), 2014, pp. 35-43.
    • (2014) Proc. IEEE Conf. Commun. Netw. Secur. (CNS) , pp. 35-43
    • Garnaev, A.1    Trappe, W.2
  • 27
    • 84927721028 scopus 로고    scopus 로고
    • One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious
    • May
    • A. Garnaev and W. Trappe, "One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious," IEEE Trans. Inf. Forensics Secur., vol. 10, no. 5, pp. 1064-1075, May 2015.
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.10 , Issue.5 , pp. 1064-1075
    • Garnaev, A.1    Trappe, W.2
  • 29
    • 84872852108 scopus 로고    scopus 로고
    • Performance study of multiuser interference mitigation schemes for hybrid broadband multibeam satellite architectures
    • J. Arnau, B. Devillers, C. Mosquera, and A. Perez-Neira, "Performance study of multiuser interference mitigation schemes for hybrid broadband multibeam satellite architectures," EURASIP J. Wireless Commun. Netw., vol. 2012, no. 1, pp. 1-19, 2012.
    • (2012) EURASIP J. Wireless Commun. Netw. , vol.2012 , Issue.1 , pp. 1-19
    • Arnau, J.1    Devillers, B.2    Mosquera, C.3    Perez-Neira, A.4
  • 30
    • 84877926659 scopus 로고    scopus 로고
    • Energy and spectral efficiency of very large multiuser MIMO systems
    • Apr.
    • H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, "Energy and spectral efficiency of very large multiuser MIMO systems," IEEE Trans. Commun., vol. 61, no. 4, pp. 1436-1449, Apr. 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.4 , pp. 1436-1449
    • Ngo, H.Q.1    Larsson, E.G.2    Marzetta, T.L.3
  • 31
    • 84938697369 scopus 로고    scopus 로고
    • An uplink interference analysis for massive MIMO systems with MRC and ZF receivers
    • N. Liang, W. Zhang, and C. Shen, "An uplink interference analysis for massive MIMO systems with MRC and ZF receivers," in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), 2015, pp. 310-315.
    • (2015) Proc. IEEE Wireless Commun. Netw. Conf. (WCNC) , pp. 310-315
    • Liang, N.1    Zhang, W.2    Shen, C.3
  • 32
    • 29044433176 scopus 로고    scopus 로고
    • Space-time interference cancellation in MIMO-OFDM systems
    • Sep.
    • T. Tang and R. W. Heath Jr., "Space-time interference cancellation in MIMO-OFDM systems," IEEE Trans. Veh. Technol., vol. 54, no. 5, pp. 1802-1816, Sep. 2005.
    • (2005) IEEE Trans. Veh. Technol. , vol.54 , Issue.5 , pp. 1802-1816
    • Tang, T.1    Heath, R.W.2
  • 33
    • 0035391461 scopus 로고    scopus 로고
    • Intercarrier interference self-cancellation scheme for OFDM mobile communication systems
    • Jul.
    • Y. Zhao and S.-G. Häggman, "Intercarrier interference self-cancellation scheme for OFDM mobile communication systems," IEEE Trans. Commun., vol. 49, no. 7, pp. 1185-1191, Jul. 2001.
    • (2001) IEEE Trans. Commun. , vol.49 , Issue.7 , pp. 1185-1191
    • Zhao, Y.1    Häggman, S.-G.2
  • 34
    • 0032670527 scopus 로고    scopus 로고
    • Analysis of new and existing methods of reducing intercarrier interference due to carrier frequency offset in OFDM
    • Mar.
    • J. Armstrong, "Analysis of new and existing methods of reducing intercarrier interference due to carrier frequency offset in OFDM," IEEE Trans. Commun., vol. 47, no. 3, pp. 365-369, Mar. 1999.
    • (1999) IEEE Trans. Commun. , vol.47 , Issue.3 , pp. 365-369
    • Armstrong, J.1
  • 35
    • 33847741864 scopus 로고    scopus 로고
    • Cooperative distributed MIMO channels in wireless sensor networks
    • Feb.
    • A. D. Coso, U. Spagnolini, and C. Ibars, "Cooperative distributed MIMO channels in wireless sensor networks," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 402-414, Feb. 2007.
    • (2007) IEEE J. Sel. Areas Commun. , vol.25 , Issue.2 , pp. 402-414
    • Coso, A.D.1    Spagnolini, U.2    Ibars, C.3
  • 37
    • 84856969548 scopus 로고    scopus 로고
    • Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
    • Q. Zhu, W. Saad, Z. Han, H. V. Poor, and T. Basar, "Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach," in Proc. Mil. Commun. Conf. (MILCOM), 2011, pp. 119-124.
    • (2011) Proc. Mil. Commun. Conf. (MILCOM) , pp. 119-124
    • Zhu, Q.1    Saad, W.2    Han, Z.3    Poor, H.V.4    Basar, T.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.