1 |
K. Bicakci and B. Tavli, "Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks," Computer Standards & Interfaces, vol. 31, no. 5, pp. 931-941, 2009.
DOI
ScienceOn
|
2 |
Ramarkishna Gummadi, David Wetherall, Ben Greenstein, and Srinivasan Seshan, "Understanding and mitigating the impact of RF interference on 802.11 networks," ACM SIGCOMM, vol. 37, pp.385-396, 2007.
|
3 |
S. Khattab, D. Mosse, and R. Melhem, "Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive?," in Proc. of the 4th international Conference on Security and Privacy in Communication Networks (SecureComm), pp.1-10, 2008.
|
4 |
IEEE 802.11h Std. IEEE 802.11, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 5: Spectrum and Transmit Power Management Extensions in the 5 GHz Band in Europe, 2003.
|
5 |
IEEE 802.15 WG, "Liaison Statement on the Compatibility between IEEE 802.11a and Radars in the Radio Location and Radion Avigation Service in the 5250-5350 MHz and 5470-5725 MHz Bands," IEEE 802.15-01/072, Jan. 2001.
|
6 |
W. Xu, W. Trappe, Y. Zhang and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. ACM Mobi-Hoc, pp.46-57, 2005.
|
7 |
A. Mishra, V. Shrivastava, D. Agarwal, S. Banerjee, S. Ganguly, "Distributed Channel Management in Uncoordinated Wireless Environments," In Proc. Mobicom, pp.170-181, Sep. 2006.
|
8 |
Vishnu Navda, Aniruddha Bohra, Samrat Ganguly, and Dan Rubenstein, "Using channel hopping to increase 802.11 resilience to jamming attacks," in Proc. of INFOCOM '07, pp.2526-2530.
|