Issue
Security and Safety
Volume 3, 2024
Security and Safety in Physical Layer Systems
Article Number 2023025
Number of page(s) 26
Section Information Network
DOI https://doi.org/10.1051/sands/2023025
Published online 04 October 2023
  1. Xu W, Trappe W and Zhang Y et al. The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). ACM, 2005, 46–57. [Google Scholar]
  2. Proakis JG. Digital Communications, 4th ed. McGraw-Hill, 2000. [Google Scholar]
  3. Noubir G and Lin G. Low-power DoS attacks in data wireless lans and countermeasures. ACM SIGMOBILE Mob Comput Commun Rev 2003; 7: 29–30. [CrossRef] [Google Scholar]
  4. Xu W, Trappe W and Zhang Y. Channel surfing: defending wireless sensor networks from interference. In: Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN), 2007, 499–508. [Google Scholar]
  5. Want R, Hopper A and Falcao V et al. The active badge location system. ACM Trans Inf Syst 1992; 10: 91–102. [Google Scholar]
  6. Bahl P and Padmanabhan VN. RADAR: an in-building RF-based user location and tracking system. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). IEEE, March 2000, 775–84. [Google Scholar]
  7. Chen Y, Francisco J and Trappe W et al. A practical approach to landmark deployment for indoor localization. In: Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). IEEE, September 2006. [Google Scholar]
  8. Priyantha N, Chakraborty A and Balakrishnan H. The cricket location-support system. In: Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom). ACM, August 2000, 32–43. [Google Scholar]
  9. Liu H, Xu W and Chen Y. Localizing jammers in wireless networks. In: Proceedings of IEEE PerCom International Workshop on Pervasive Wireless Networking (IEEE PWN). IEEE, 2009. [Google Scholar]
  10. Pelechrinis K, Koutsopoulos I and Broustis I et al. Lightweight jammer localization in wireless networks: system design and implementation. In: Proceedings of the IEEE Global Communication Conference (GLOBECOM). IEEE, December 2009. [Google Scholar]
  11. Liu Z, Liu H and Xu W et al. Wireless jamming localization by exploiting nodes’ hearing ranges. In: Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS). Springer Berlin Heidelberg, 2010. [Google Scholar]
  12. Liu H, Liu Z and Chen Y et al. Localizing multiple jamming attackers in wireless networks. In: 2011 31st International Conference on Distributed Computing Systems. Minneapolis, MN, USA: IEEE, 2011, 517–28. [CrossRef] [Google Scholar]
  13. Çakıroǧlu M and Özcerit AT. Jamming detection mechanisms for wireless sensor networks. In: Proceedings of the 3rd International ICST Conference on Scalable Information Systems (INFOSCALE). ICST, May 2010, 1–8. [Google Scholar]
  14. Navda V, Bohra A and Ganguly S et al. Using channel hopping to increase 802.11 resilience to jamming attacks. In: IEEE Infocom Minisymposium. IEEE, May 2007, 2526–30. [Google Scholar]
  15. Khattab S, Mosse D and Melhem R. Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks. In: Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems (Mobiquitous). Brussels, Belgium: ICST, 2008, 1–10. [Google Scholar]
  16. Ma K, Zhang Y and Trappe W. Mobile network management and robust spatial retreats via network dynamics. In: Proceedings of the 1st International Workshop on Resource Provisioning and Management in Sensor Networks (RPMSN), 2005. [Google Scholar]
  17. Xu W, Trappe W and Zhang Y. Anti-jamming timing channels for wireless networks. In: Proceedings of the First ACM Conference on Wireless Network Security (WiSec). New York, NY, USA: ACM, 2008, 203–13. [Google Scholar]
  18. Cagalj M, Capkun S and Hubaux J. Wormhole-based anti-jamming techniques in sensor networks. In: IEEE Transactions on Mobile Computing. IEEE, January 2007, 100–14. [CrossRef] [Google Scholar]
  19. Ward A, Jones A and Hopper A. A new location technique for the active office. IEEE Pers Commun 1997; 4: 42–7. [CrossRef] [Google Scholar]
  20. Chen Y, Kleisouris K and Li X et al. The robustness of localization algorithms to signal strength attacks: a comparative study. In: Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS). Springer Berlin Heidelberg, June 2006, 546–63. [CrossRef] [Google Scholar]
  21. Chandrasekaran G, Ergin MA and Yang J et al. Empirical evaluation of the limits on localization using signal strength. In: Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). IEEE, June 2009. [Google Scholar]
  22. Enge P and Misra P. Global Positioning System: Signals, Measurements and Performance. Ganga-Jamuna Pr, 2001. [Google Scholar]
  23. He T, Huang C and Blum B et al. Range-free localization schemes in large scale sensor networks. In: Proceedings of the Ninth Annual ACM International Conference on Mobile Computing and Networking (MobiCom). ACM, 2003. [Google Scholar]
  24. Bulusu N, Heidemann J and Estrin D. GPS-less low-cost outdoor localization for very small devices. IEEE Pers Commun Mag 2000; 7: 28–34. [CrossRef] [Google Scholar]
  25. Niculescu D and Nath B. Ad hoc positioning system (APS). In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM). IEEE, 2001, 2926–31. [Google Scholar]
  26. Shang Y, Ruml W and Zhang Y et al. Localization from mere connectivity. In: Proceedings of the Fourth ACM International Symposium on Mobile Ad-Hoc Networking and Computing (MobiHoc). ACM, Jun 2003, 201–12. [CrossRef] [Google Scholar]
  27. Kim YS, Mokaya F and Chen E et al. All your jammers belong to us – localization of wireless sensors under jamming attack. In: Proceedings of International Communication Conference (ICC). IEEE, 2012. [Google Scholar]
  28. Wood A, Stankovic J and Son S. JAM: a jammed-area mapping service for sensor networks. In: 24th IEEE Real-Time Systems Symposium. IEEE, 2003, 286–297. [CrossRef] [Google Scholar]
  29. Goldsmith A, Wireless Communications. Cambridge: Cambridge University Press, 2005. [CrossRef] [Google Scholar]
  30. Aceinna, Aceinna. http://www.aceinna.com/wireless-sensor-networks/. [Google Scholar]
  31. Cormen TH, Leiserson CE and Rivest RL et al. Introduction to Algorithms. Cambridge, MA: MIT Press, 2001. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.