Optimal power allocation and scheduling under jamming attacks

S D'Oro, E Ekici, S Palazzo - IEEE/ACM Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we consider a jammed wireless scenario where a network operator aims to
schedule users to maximize network performance while guaranteeing a minimum …

A real-time and protocol-aware reactive jamming framework built on software-defined radios

D Nguyen, C Sahin, B Shishkin, N Kandasamy… - Proceedings of the …, 2014 - dl.acm.org
This paper develops a software-defined radio (SDR) framework for real-time reactive
adversarial jamming in wireless networks. The system consists of detection and RF …

Antifragile communications

M Lichtman, MT Vondal, TC Clancy… - IEEE Systems …, 2016 - ieeexplore.ieee.org
This paper introduces the concept of antifragile communications, which we define as the
capability for a communications system to improve in performance due to a system stressor …

A trigger identification service for defending reactive jammers in WSN

Y Xuan, Y Shen, NP Nguyen… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
During the last decade, Reactive Jamming Attack has emerged as a great security threat to
wireless sensor networks, due to its mass destruction to legitimate sensor communications …

Analysis of reactive jamming against satellite communications

M Lichtman, JH Reed - International Journal of Satellite …, 2016 - Wiley Online Library
In this paper, we analyze the feasibility of reactive jamming in a satellite communications
scenario and propose a countermeasure that takes advantage of the constraints associated …

[PDF][PDF] Multiple secret keys based security for wireless sensor networks

VT Kesavan, S Radhakrishnan - International Journal of …, 2012 - academia.edu
We propose a security approach that uses secret key cryptography and key management
along with re-keying support. A salient feature of our approach is that a secret key is …

A mixed-integer programming approach for locating jamming devices in a flow-jamming attack

S Vadlamani, D Schweitzer, H Medal, A Nandi… - Computers & Operations …, 2018 - Elsevier
The ubiquitous nature of wireless networks makes them increasingly prone to jamming
attacks as such attacks become more sophisticated. In this paper, we seek to gain …

Secret key cryptography based security approach for wireless sensor networks

VT Kesavan, S Radhakrishnan - … International Conference on …, 2012 - ieeexplore.ieee.org
In this paper, we propose a security approach which uses Secret Key (SK) cryptography and
key management along with re-keying support. A salient feature of this approach is that a SK …

Quarantine-based mitigation of effects of a local DoS attack

JC Mota, JP Vasseur, A Di Pietro, JW Hui - US Patent 9,286,473, 2016 - Google Patents
7,137,145 B2 11/2006 Gleichauf 7,483,972 B2 1/2009 Bhattacharya et al. 7,526,806 B2
4/2009 Wiley et al. 7,607,041 B2 10/2009 Kraemer et al. 7,653,941 B2 1/2010 Gleichauf …

[图书][B] Agile Spectrum-Sharing Wireless Systems Using Software-Defined Radios and Reconfigurable Antennas

DHH Nguyen - 2017 - search.proquest.com
Since the radio spectrum is a scarce resource, to satisfy the future demand for wireless
capacity, more efficient methods to utilize the spectrum are needed. The recent trend of …