메뉴 건너뛰기




Volumn 14, Issue 6, 2017, Pages 650-663

Learning-Based Jamming Attack against Low-Duty-Cycle Networks

Author keywords

cyber physical system; jamming attack; low duty cycle network; Security

Indexed keywords

CYBER PHYSICAL SYSTEM; EMBEDDED SYSTEMS; ENERGY EFFICIENCY; SENSOR NODES; STOCHASTIC SYSTEMS;

EID: 85038216780     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2015.2501288     Document Type: Article
Times cited : (20)

References (36)
  • 1
    • 79957590723 scopus 로고    scopus 로고
    • ELMO: Energy aware local monitoring in sensor networks
    • Jul./Aug
    • I. Khalil, "ELMO: Energy aware local monitoring in sensor networks, " IEEE Trans. Dependable Secure Comput., vol. 8, no. 4, pp. 523-536, Jul./Aug. 2011.
    • (2011) IEEE Trans. Dependable Secure Comput , vol.8 , Issue.4 , pp. 523-536
    • Khalil, I.1
  • 2
  • 5
    • 84925349017 scopus 로고    scopus 로고
    • LearJam: An energy-efficient learning-based jamming attack against low-duty-cycle networks
    • Z. Yang, P. Cheng, and J. Chen, "LearJam: An energy-efficient learning-based jamming attack against low-duty-cycle networks, " in Proc. IEEE 11th Int. Conf. Mobile Ad Hoc Sens. Syst., 2014, pp. 354-362.
    • (2014) Proc IEEE 11th Int. Conf. Mobile Ad Hoc Sens. Syst , pp. 354-362
    • Yang, Z.1    Cheng, P.2    Chen, J.3
  • 7
    • 81455142735 scopus 로고    scopus 로고
    • Packet-hiding methods for preventing selective jamming attacks
    • Jan./Feb
    • A. Proano and L. Loukas, "Packet-hiding methods for preventing selective jamming attacks, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 1, pp. 101-114, Jan./Feb. 2012.
    • (2012) IEEE Trans. Dependable Secure Comput , vol.9 , Issue.1 , pp. 101-114
    • Proano, A.1    Loukas, L.2
  • 8
    • 84921341664 scopus 로고    scopus 로고
    • Camouflage Traffic: Minimizing message delay for smart grid applications under jamming
    • Jan./Feb
    • L. Zhuo, W. Wang, and C. Wang, "Camouflage Traffic: Minimizing message delay for smart grid applications under jamming, " IEEE Trans. Dependable Secure Comput., vol. 12, no. 1, pp. 31-44, Jan./Feb. 2015.
    • (2015) IEEE Trans. Dependable Secure Comput , vol.12 , Issue.1 , pp. 31-44
    • Zhuo, L.1    Wang, W.2    Wang, C.3
  • 9
    • 84940705050 scopus 로고    scopus 로고
    • Optimal DoS attack scheduling in wireless networked control systems
    • Aug
    • H. Zhang, P. Cheng, L. Shi, and J. Chen, "Optimal DoS attack scheduling in wireless networked control systems, " IEEE Trans. Control Syst. Technol., DOI: 10.1109/TCST.2015.2462741, Aug. 2015.
    • (2015) IEEE Trans. Control Syst. Technol
    • Zhang, H.1    Cheng, P.2    Shi, L.3    Chen, J.4
  • 10
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks, " IEEE Comput., vol. 35, no. 10, pp. 54-62, Oct. 2002.
    • (2002) IEEE Comput , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 12
    • 84924785601 scopus 로고    scopus 로고
    • Robust and cost-effective design of cyber-physical systems: An optimal middleware deployment approach
    • Mar
    • D. Shin, S. He and J. Zhang, "Robust and Cost-Effective Design of Cyber-Physical Systems: An Optimal Middleware Deployment Approach, " IEEE/ACM Trans. Netw., DOI: 10.1109/TNET.2015.2403862, Mar. 2015.
    • (2015) IEEE/ACM Trans. Netw
    • Shin, D.1    He, S.2    Zhang, J.3
  • 13
    • 78650681547 scopus 로고    scopus 로고
    • Designing an industrial real-Time measurement and monitoring system based on embedded system and zigbee
    • W. T. Sung and Y. C. Hsu, "Designing an industrial real-Time measurement and monitoring system based on embedded system and zigbee, " Expert Syst. Appl, vol. 38, no. 4, pp. 4522-4529, 2011.
    • (2011) Expert Syst. Appl , vol.38 , Issue.4 , pp. 4522-4529
    • Sung, W.T.1    Hsu, Y.C.2
  • 15
    • 84883083273 scopus 로고    scopus 로고
    • PSR: Practical synchronous rendezvous in low-duty-cycle wireless networks
    • H. Huang, J. Yun, Z. Zhong, S. Kim, and Tian He, "PSR: Practical synchronous rendezvous in low-duty-cycle wireless networks, " in Proc. IEEE INFOCOM, 2013, pp. 2661-2669.
    • (2013) Proc IEEE INFOCOM , pp. 2661-2669
    • Huang, H.1    Yun, J.2    Zhong, Z.3    Kim, S.4    He, T.5
  • 16
    • 84941918744 scopus 로고    scopus 로고
    • Data gathering optimization by dynmaic sensing and routing in rechargeable sensor networks
    • Jun
    • Y. Zhang, S. He, and J. Chen, "Data gathering optimization by dynmaic sensing and routing in rechargeable sensor networks, " IEEE/ACM Trans. Netw., DOI: 10.1109/TNET.2015.2425146, Jun. 2015.
    • (2015) IEEE/ ACM Trans. Netw
    • Zhang, Y.1    He, S.2    Chen, J.3
  • 17
    • 70450231628 scopus 로고    scopus 로고
    • Opportunistic flooding in lowduty-cycle wireless sensor networks with unreliable links
    • S. Guo, Y. Gu, B. Jiang, and T. He, "Opportunistic flooding in lowduty-cycle wireless sensor networks with unreliable links, " in Proc. ACM 15th Annu. Int. Conf. Mobile Comput. Netw., 2009, pp. 133-144.
    • (2009) Proc ACM 15th Annu. Int. Conf. Mobile Comput. Netw , pp. 133-144
    • Guo, S.1    Gu, Y.2    Jiang, B.3    He, T.4
  • 18
    • 17744369960 scopus 로고    scopus 로고
    • CSMA-MPS: A Minimum preamble sampling MAC protocol for low power wireless sensor networks
    • S. Mahlknecht and M. Boeck, "CSMA-MPS: A Minimum preamble sampling MAC protocol for low power wireless sensor networks, " in Proc. IEEE Int. WorkshopFactory Commun. Syst., 2004, pp. 73-80.
    • (2004) Proc. IEEE Int. WorkshopFactory Commun. Syst , pp. 73-80
    • Mahlknecht, S.1    Boeck, M.2
  • 21
    • 84855736529 scopus 로고    scopus 로고
    • DCS: Distributed asynchronous clock synchronization in delay tolerant networks
    • Mar
    • B. Choi, H. Liang, X. Shen, and W. Zhuang, "DCS: Distributed asynchronous clock synchronization in delay tolerant networks, " IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 3, pp. 491-504, Mar. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst , vol.23 , Issue.3 , pp. 491-504
    • Choi, B.1    Liang, H.2    Shen, X.3    Zhuang, W.4
  • 24
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and network defense policies in wireless sensor networks
    • M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks, " in Proc. IEEE INFOCOM, 2007, pp. 1307-1315.
    • (2007) Proc IEEE INFOCOM , pp. 1307-1315
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 28
    • 80052164345 scopus 로고    scopus 로고
    • EDJam: Effective dynamic jamming against IEEE 802.15.4-compliant wireless personal area networks
    • G. Liu, J. Luo, Q. Xiao, and B. Xiao, "EDJam: Effective dynamic jamming against IEEE 802.15.4-compliant wireless personal area networks, " in Proc. IEEE Int. Conf. Commun., 2011, pp. 1-5.
    • (2011) Proc. IEEE Int. Conf. Commun , pp. 1-5
    • Liu, G.1    Luo, J.2    Xiao, Q.3    Xiao, B.4
  • 31
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks, " Wireless Netw., vol. 8, no. 5, pp. 521-534, 2002.
    • (2002) Wireless Netw , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3    Wen, V.4    Culler, D.E.5
  • 32
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • M. Naor and M. Yung, "Universal one-way hash functions and their cryptographic applications, " in Proc. 21st ACM Symp. Theory Comput., 1989, pp. 33-43.
    • (1989) Proc. 21st ACM Symp. Theory Comput , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 34
    • 10944266504 scopus 로고    scopus 로고
    • HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
    • Oct-Dec
    • O. Younis and S. Fahmy, "HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, " IEEE Trans. Mobile Comput., vol. 3, no. 4, pp. 366-379, Oct.-Dec. 2004.
    • (2004) IEEE Trans. Mobile Comput , vol.3 , Issue.4 , pp. 366-379
    • Younis, O.1    Fahmy, S.2
  • 35
    • 84893289329 scopus 로고    scopus 로고
    • Droplet: A New denial-of-service attack on low power wireless sensor networks
    • Z. He and T. Voigt, "Droplet: A New denial-of-service attack on low power wireless sensor networks, " in Proc. IEEE 10th Int. Conf. Mobile Ad-Hoc Sens. Syst., 2013, pp. 542-550.
    • (2013) Proc IEEE 10th Int. Conf. Mobile Ad-Hoc Sens. Syst , pp. 542-550
    • He, Z.1    Voigt, T.2
  • 36
    • 79960872905 scopus 로고    scopus 로고
    • PW-MAC: An energy-efficient predictive-wakeup MAC protocol for wireless sensor networks
    • L. Tang, Y. Sun, O. Gurewitz, and D. B. Johnson, "PW-MAC: An energy-efficient predictive-wakeup MAC protocol for wireless sensor networks, " in Proc. IEEE INFOCOM, 2011, pp. 1305-1313.
    • (2011) Proc IEEE INFOCOM , pp. 1305-1313
    • Tang, L.1    Sun, Y.2    Gurewitz, O.3    Johnson, D.B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.