Sciweavers

97 search results - page 3 / 20
» Jamming sensor networks: attack and defense strategies
Sort
View
DCOSS
2010
Springer
13 years 7 months ago
Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges
Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wid...
Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen
GLOBECOM
2009
IEEE
14 years 12 days ago
Optimal Power Allocation Strategy Against Jamming Attacks Using the Colonel Blotto Game
Abstract—Cognitive radio technologies have become a promising approach to increase the efficiency of spectrum utilization. Although cognitive radio has been intensively studied ...
Yongle Wu, Beibei Wang, K. J. Ray Liu
CISS
2011
IEEE
12 years 9 months ago
Anti-jamming performance of cognitive radio networks
In this paper, we study both the jamming capability of the cognitiveradio-based jammers and the anti-jamming capability of the cognitive radio networks. We first setup the models...
Xiaohua Li, Wednel Cadeau
SUTC
2010
IEEE
13 years 9 months ago
Pollution Attack Defense for Coding Based Sensor Storage
—We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decodi...
Levente Buttyán, Laszlo Czap, István...
ICICS
2010
Springer
13 years 3 months ago
Compromise-Resilient Anti-jamming for Wireless Sensor Networks
Abstract. Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communic...
Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao