Sciweavers

1306 search results - page 2 / 262
» Localizing Jammers in Wireless Networks
Sort
View
MASS
2010
162views Communications» more  MASS 2010»
14 years 6 months ago
Improving anti-jamming capability and increasing jamming impact with mobility control
Abstract--The impact of a jamming attack on wireless communication depends on a number of physical characteristics and network protocol parameters. In particular, it depends on the...
Patrick Tague
90
Voted
MOBIHOC
2009
ACM
15 years 6 months ago
Zero pre-shared secret key establishment in the presence of jammers
Tao Jin, Guevara Noubir, Bishal Thapa
CORR
2010
Springer
207views Education» more  CORR 2010»
14 years 11 months ago
A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks
This paper presents a simple local medium access control protocol, called Jade, for multi-hop wireless networks with a single channel that is provably robust against adaptive adver...
Andréa W. Richa, Christian Scheideler, Stef...
GLOBECOM
2010
IEEE
14 years 9 months ago
Identifying Insider-Based Jammers in Multi-Channel Wireless Networks
Abstract-- We consider the problem of identifying insiderbased attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequen...
Hoang Nguyen, Thadpong Pongthawornkamol, Klara Nah...
130
Voted
COMSUR
2011
251views Hardware» more  COMSUR 2011»
13 years 11 months ago
Denial of Service Attacks in Wireless Networks: The Case of Jammers
—The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such a...
Konstantinos Pelechrinis, M. Iliofotou, Srikanth V...