GloMoSim: a library for parallel simulation of large-scale wireless networks
PADS '98 Proceedings of the twelfth workshop on Parallel and distributed simulation
The broadcast storm problem in a mobile ad hoc network
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Next century challenges: scalable coordination in sensor networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
A scalable location service for geographic ad hoc routing
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Consistent group membership in ad hoc networks
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Coping with communication gray zones in IEEE 802.11b based ad hoc networks
WOWMOM '02 Proceedings of the 5th ACM international workshop on Wireless mobile multimedia
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Denial of Service in Sensor Networks
Computer
Communications of the ACM - Wireless networking security
Range-free localization schemes for large scale sensor networks
Proceedings of the 9th annual international conference on Mobile computing and networking
TAG: a Tiny AGgregation service for Ad-Hoc sensor networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Beyond average: toward sophisticated sensing with queries
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Boundary estimation in sensor networks: theory and methods
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
The holes problem in wireless sensor networks: a survey
ACM SIGMOBILE Mobile Computing and Communications Review
Defending against path-based DoS attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Time synchronization attacks in sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Channel surfing: defending wireless sensor networks from jamming and interference
Proceedings of the 4th international conference on Embedded networked sensor systems
Wormhole-Based Antijamming Techniques in Sensor Networks
IEEE Transactions on Mobile Computing
Underground structure monitoring with wireless sensor networks
Proceedings of the 6th international conference on Information processing in sensor networks
Channel surfing: defending wireless sensor networks from interference
Proceedings of the 6th international conference on Information processing in sensor networks
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
Towards characterizing the effectiveness of random mobility against actuation attacks
Computer Communications
A multi-channel defense against jamming attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Managing the Mobility of a Mobile Sensor Network Using Network Dynamics
IEEE Transactions on Parallel and Distributed Systems
Anti-jamming timing channels for wireless networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Limiting DoS attacks during multihop data delivery in wireless sensor networks
International Journal of Security and Networks
Secure sensor network routing: a clean-slate approach
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Defending wireless sensor networks from radio interference through channel adaptation
ACM Transactions on Sensor Networks (TOSN)
A survey on jamming avoidance in ad-hoc sensory networks
Journal of Computing Sciences in Colleges
Jamming detection mechanisms for wireless sensor networks
Proceedings of the 3rd international conference on Scalable information systems
Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive?
Proceedings of the 4th international conference on Security and privacy in communication netowrks
JAID: An algorithm for data fusion and jamming avoidance on distributed sensor networks
Pervasive and Mobile Computing
Proceedings of the 2nd ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
International Journal of Communication Networks and Distributed Systems
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Anti-jamming for embedded wireless networks
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Jammer localization in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks
Computers and Electrical Engineering
Genetic algorithm based routing method for efficient data transmission in sensor networks
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Potential game model to detect holes in sensor networks
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Detection of radio interference attacks in VANET
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Detecting and mitigating the impact of wideband jammers in IEEE 802.11 WLANs
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Detection of jamming attacks in wireless ad hoc networks using error distribution
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Detection of reactive jamming in sensor networks
ACM Transactions on Sensor Networks (TOSN)
A security analysis for wireless sensor mesh networks in highly critical systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
An intrusion detection framework for sensor networks using ant colony
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Distributed jammer network: impact and characterization
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Spatio-temporal techniques for anti-jamming in embedded wireless networks
EURASIP Journal on Wireless Communications and Networking
Compromise-resilient anti-jamming for wireless sensor networks
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Computer Networks: The International Journal of Computer and Telecommunications Networking
A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks
Proceedings of the 6th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Impact of high-mobility radio jamming in large-scale wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A security architecture for mobile wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Wireless jamming localization by exploiting nodes’ hearing ranges
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part II
Jamming aware routing for MHWN with dynamic measurement
Computers and Electrical Engineering
DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Mobile Networks and Applications
Securing sensor reports in wireless sensor networks
Euro-Par'07 Proceedings of the 13th international Euro-Par conference on Parallel Processing
M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks
Integrated Computer-Aided Engineering
Hi-index | 0.00 |
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the easewith which attacks are perpetrated. Rather than jeopardize design requirements which call for simple, inexpensive, mass-producible devices, we propose a coping strategy that detects and maps jammed regions. We describea mapping protocol for nodes that surround a jammerwhich allows network applications to reason about the region as an entity, rather than as a collection of brokenlinks and congested nodes. This solution is enabled bya set of design principles: loose group semantics, eagereavesdropping, supremacy of local information, robustness to packet loss and failure, and early use of results.Performance results show that regions can be mapped in1 - 5 seconds, fast enough for real-time response. Witha moderately connected network, the protocol is robust tofailure rates as high as 25 percent.