[1]
M. Strasser, B. Danev, S. Capkun, Detection of reactive jamming in sensor networks, ACM Transactions on Sensor Networks (TOSN), 7(2) (2000) 16.
DOI: 10.1145/1824766.1824772
Google Scholar
[2]
R. H. Gohary, Y. Huang, Z. -Q. Luo, J. -S. Pang, A generalized iterative water-filling algorithm for distributed power control in the presence of a jammer, IEEE Transactions on Signal Processing, 57(7) (2009) 2660-2674.
DOI: 10.1109/tsp.2009.2014275
Google Scholar
[3]
X. Li, Y. Zhu, B. Li, Optimal anti-jamming strategy in sensor networks, in Proceedings of IEEE International Conference on Communications, (2012) 178-182.
DOI: 10.1109/icc.2012.6364589
Google Scholar
[4]
K. Siddhabathula, Q. Dong, D. Liu, M. Wright, Fast jamming detection in sensor networks, in Proceedings of IEEE International Conference on Communications, (2012) 934-938.
DOI: 10.1109/icc.2012.6363672
Google Scholar
[5]
W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, (2005) 46-57.
DOI: 10.1145/1062689.1062697
Google Scholar
[6]
M. Wilhelm, I. Martinovic, J. B. Schmitt, V. Lenders, reactive jamming in wireless networks: how realistic is the threat?, in Proceedings of the fourth ACM conference on Wireless network security, (2011) 47-52.
DOI: 10.1145/1998412.1998422
Google Scholar
[7]
T. Cheng, P. Li, S. Zhu, An algorithm for jammer localization in wireless sensor networks, in Proceedings of IEEE 26th International Conference on Advanced Information Networking and Applications (2012) 724-731.
DOI: 10.1109/aina.2012.11
Google Scholar
[8]
M. Li, I. Koutsopoulos, R. Poovendran, Optimal jamming attacks and network defense policies in wireless sensor networks, in Proceedings of 26th IEEE International Conference on Computer Communications, (2007) 1307-1315.
DOI: 10.1109/infcom.2007.155
Google Scholar
[9]
W. Xu, T. Wood, W. Trappe, Y. Zhang, Channel surfing and spatial retreats: defenses against wireless denial of service, in Proceedings of the 3rd ACM workshop on Wireless security, (2004) 80-89.
DOI: 10.1145/1023646.1023661
Google Scholar
[10]
L. Zhang, Z. Guan, T. Melodia, Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relaying, in Proceedings of IEEE International Conference on Computer Communications, (2014) 1-9.
DOI: 10.1109/infocom.2014.6847979
Google Scholar
[11]
Q. Yan, H. Zeng, T. Jiang, M. Li, W. Lou, Y. T. Hou, Mimo-based jamming resilient communication in wireless networks, http: /digital. cs. usu. edu/~mingli/papers/MIMOJam_TS. pdf.
DOI: 10.1109/infocom.2014.6848218
Google Scholar