[1]
|
Wood, A. and Stankovic, J. (2002) Denial of Service in Sensor Networks. IEEE Computer, 35, 54-62. http://dx.doi.org/10.1109/MC.2002.1039518
|
[2]
|
Gurwinder, K. and Rachit, G.M. (2012) Energy Efficient Topologies for Wireless Sensor Networks. International Journal of Distributed and Parallel Systems (IJDPS), 3, 179-192.
|
[3]
|
Virmani, D. and Jain, S. (2013) Cluserting Based Topology Control Protocol for Data Delivery in Wireless Sensor Networks. International Journal of Computer Science and Issues, 1-12.
|
[4]
|
Xu, Y., Bien, S., Mori, Y., Heidemann, J. and Estrin, D. (2008) Topology Control Protocols to Conserve Energy in Wireless ad Hoc Networks. CENS Technical Report UCLA, Number 6, Los Angeles, 128-134.
|
[5]
|
Lee, J.-S. and Chang, C.-C. (2007) Secure Communications for Cluster-Based ad Hoc Networks Using Node Identities. Journal of Network and Computer Applications, 30, 1377-1396. http://dx.doi.org/10.1016/j.jnca.2006.10.003
|
[6]
|
Wu, B., Wu, J., Fernandez, E.B., Ilyas, M. and Magliveras, S. (2007) Secure and Efficient Key Management in Mobile ad Hoc Networks. Journal of Network and Computer Applications, 30, 937-954. http://dx.doi.org/10.1016/j.jnca.2005.07.008
|
[7]
|
Lv, B., Zhang, X.-F., Wang, C. and Yuan, N.-C. (2008) Study of Channelized Noise Frequency-Spot Jamming Techniques.
|
[8]
|
Xi, Y.-Y. and Cheng, N.-P. (2011) Performance Analysis of Multi-Tone Frequency Sweeping Jamming for Direct Sequence Spread Spectrum Systems.
|
[9]
|
Murray, S. (1975) Generic Multi-Directional Barrage Jamming System. US Patent No. 3879732.
|
[10]
|
Schuerger, J. and Garmatyuk, D. (2008) Deceptive Jamming Modelling in Radar Sensor Networks. Military Communications Conference, San Diego, 16-19 November 2008, 1-7.
|
[11]
|
Xu, W., Wood, T., Trappe, W. and Zhang, Y.Y. (2004) Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service. Proceedings of the 2004 ACM Workshop on Wireless Security, ACM, New York, 80-89. http://dx.doi.org/10.1145/1023646.1023661
|
[12]
|
Sari, A. and Necat, B. (2012) Securing Mobile Ad-Hoc Networks against Jamming Attacks through Unified Security Mechanism. International Journal of Ad Hoc, Sensor & Ubiquitous Computing (IJASUC), 3, 79-94. http://dx.doi.org/10.5121/ijasuc.2012.3306
|
[13]
|
Law, Y., Hartel, P., den Hartog, J. and Havinga, P. (2005) Link-Layer Jamming Attacks on S-MAC. Proceedings of the Second European Workshop on Wireless Sensor Networks, 31 January-2 February 2005, 217-225. http://dx.doi.org/10.1109/EWSN.2005.1462013
|
[14]
|
Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, 8, 19-28. http://dx.doi.org/10.4236/ijcns.2015.83003
|
[15]
|
Xu, W.Y., Ma, K., Trappe, W. and Zhang, Y. (2006) Jamming Sensor Networks: Attack and Defense Strategies. IEEE Network, 20, 41-47. http://dx.doi.org/10.1109/MNET.2006.1637931
|
[16]
|
Wood, A. and Stankovic, J.A. (2002) Denial of Service in Sensor Networks. Computer, 35, 54-62. http://dx.doi.org/10.1109/MC.2002.1039518
|
[17]
|
Balogun, V. and Krings, A. (2014) Mitigating Constant Jamming in Cognitive Radio Networks Using Hybrid FEC Code. IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), Victoria, 13-16 May 2014, 704-711.
|
[18]
|
Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C. and Pantziou, G. (2009) A Survey on Jamming Attacks and Countermeasures in WSNs. IEEE Communications Surveys & Tutorials, 11, 42-56. http://dx.doi.org/10.1109/SURV.2009.090404
|
[19]
|
Sari, A. and Necat, B. (2012) Impact of RTS Mechanism on TORA and AODV Protocol’s Performance in Mobile Ad Hoc Networks. International Journal of Science and Advanced Technology (IJSAT), 2, 188-191.
|
[20]
|
Wilhelm, M., Martinovic, I., Schmitt, J.B. and Lenders, V. (2011) Short Paper: Reactive Jamming in Wireless Networks—How Realistic Is the Threat? Proceedings of the Fourth ACM Conference on Wireless Network Security, ACM, New York, 47-52.
|
[21]
|
Chen, D., Deng, J. and Varshney, P.K. (2003) Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming. MOBICOM-Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking, San Diego, 14-19 September 2003.
|
[22]
|
Gokhale, V., Ghosh, S. and Gupta, A. (2010) Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey. In: Khan Pathan, A., Ed., Security of Self-Organizing Networks, MANET WSN WMN VANET, Auerbach Publications, 195-225. http://dx.doi.org/10.1201/EBK1439819197-12
|
[23]
|
Xu, W., Trappe, W., Zhang, Y.Y. and Wood, T. (2005) The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. MobiHoc ’05: Proceedings of the 6th ACM International Symposium on Mobile ad Hoc Networking and Computing, Urbana-Champaign, 25-28 May 2005, 46-57. http://dx.doi.org/10.1145/1062689.1062697
|
[24]
|
Sari, A. (2014) Security Approaches in IEEE 802.11 MANET. International Journal of Communications, Network and System Sciences, 7, 365-372. http://dx.doi.org/10.4236/ijcns.2014.79038
|
[25]
|
Ju, K. and Chung, K. (2012) Jamming Attack Detection and Rate Adaptation Scheme for IEEE 802.11 Multi Hop Tactical Networks. International Journal of Security and Its Applications, 6, 149-154.
|
[26]
|
Mahajan, R. and Nair, S. (2013) Performance Evaluation of Zigbee Protocol Using Opnet Modeler for Mine Safety. International Journal of Computer Science and Network, 2, 62-66.
|
[27]
|
OPNET Technologies Inc. “Opnet Simulator”. www.opnet.net
|