Uneingeschränkter Zugang

Amn-Pso Method For Jamming Unmanned Aerial Vehicle Network


Zitieren

R. W. Anwar, M. Bakhtiari, A. Zainal, A. H. Abdullah, and K. N. Qureshi, “Security Issues and Attacks in Wireless Sensor Network”, World Applied Sciences Journal, vol. 30, 2014, pp. 1224-1227. Search in Google Scholar

C.-M. Pintea and P. C. Pop, “Sensitive ants for denial jamming attack on wireless sensor network”, in International Joint Conference SOCO’13-CISIS’13-ICEUTE’13, 2014, pp. 409-418.10.1007/978-3-319-01854-6_42 Search in Google Scholar

S. Bhattacharya and T. Başar, “Differential game-theoretic approach to a spatial jamming problem”, in Advances in Dynamic Games, Springer 2013, pp. 245-268.10.1007/978-0-8176-8355-9_13 Search in Google Scholar

R. Di Pietro, S. Guarino, N. Verde, J. Domingo-Ferrer, “Security in wireless ad-hoc networks–a survey”, Computer Communications, vol. 51, 2014, pp. 1-20.10.1016/j.comcom.2014.06.003 Search in Google Scholar

Z. Lu, W. Y. Wang, and C. Wang, “Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications”, IEEE Transactions on Mobile Computing, vol. 13, pp. 1746-1759, Aug 2014. Search in Google Scholar

N. Lyamin, A. Vinel, M. Jonsson, and J. Loo, “Real-Time Detection of Denial-of-Service Attacks in IEEE 802.11 p Vehicular Networks”, IEEE communications letters, vol. 18, 2014, pp. 110-113.10.1109/LCOMM.2013.102213.132056 Search in Google Scholar

M. Poturalski, M. Flury, P. Papadimitratos, J. P. Hubaux, and J. Y. Le Boudec, “Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures”, IEEE Transactions on Wireless Communications, vol. 10, pp. 1334-1344, Apr 2011. Search in Google Scholar

Z. M. Fadlullah, H. Nishiyama, N. Kato, and M. M. Fouda, “Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks”, IEEE Network, vol. 27, pp. 51-56, May-Jun 2013.10.1109/MNET.2013.6523809 Search in Google Scholar

Y. T. Tsou, C. S. Lu, and S. Y. Kuo, “MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, vol. 12, pp. 28172829, Jun 2013. Search in Google Scholar

P. Lee, A. Clark, L. Bushnell, and R. Poovendran, “Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach”, in Control of Cyber-Physical Systems, Springer 2013, pp. 161-175.10.1007/978-3-319-01159-2_9 Search in Google Scholar

A. Proano and L. Lazos, “Packet-Hiding Methods for Preventing Selective Jamming Attacks”, IE Transactions on Dependable and Secure Computing, vol. 9, pp. 101-114, Jan-Feb 2012.10.1109/TDSC.2011.41 Search in Google Scholar

Q. Liu, J. Yin, and S. Yu, “A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology”, in Cyberspace Safety and Security, Springer 2013, pp. 243257.10.1007/978-3-319-03584-0_18 Search in Google Scholar

M. Y. Li, I. Koutsopoulos, and R. Poovendran, “Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, vol. 9, pp. 1119-1133, Aug 2010. Search in Google Scholar

H. Pezeshki, X. Y. Zhou, and B. Maham, “Jamming Energy Allocation in Training-Based Multiple Access Systems”, IEEE Communications Letters, vol. 17, pp. 1140-1143, Jun 2013. Search in Google Scholar

Y. Zhang and L. S. Yang, “Triangle and GA Methods for UAVs Jamming”, Mathematical Problems in Engineering, vol. 2014, 2014, p. 8. Search in Google Scholar

eISSN:
1178-5608
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
Volume Open
Fachgebiete der Zeitschrift:
Technik, Einführungen und Gesamtdarstellungen, andere