Sciweavers

291 search results - page 3 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
MOBIHOC
2005
ACM
14 years 4 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...
NETWORK
2006
177views more  NETWORK 2006»
13 years 5 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang
IPPS
2006
IEEE
13 years 11 months ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
WIOPT
2010
IEEE
13 years 3 months ago
Wireless jamming attacks under dynamic traffic uncertainty
Yalin Evren Sagduyu, Randall A. Berry, Anthony Eph...
MASS
2010
162views Communications» more  MASS 2010»
13 years 3 days ago
Improving anti-jamming capability and increasing jamming impact with mobility control
Abstract--The impact of a jamming attack on wireless communication depends on a number of physical characteristics and network protocol parameters. In particular, it depends on the...
Patrick Tague