参考文献
[1]孙言强,王晓东,周兴铭.无线网络中的干扰攻击[J].软件学报,2012,34(5):1207-1221.
[2]BENSLIMANE A,NGUYEN-MINH H.Jamming attack model and detection method for beacons under multichannel operation in vehicular networks[J].IEEE Transactions on Vehicular Technology,2017,66(7):6475-6488.
[3]王棋萍,魏祥麟,范建华,等.基于接收干扰信号强度估计的干扰源定位算法[J].军事通信技术,2016,37(2):28-32.
[4]赵泽,尚鹏飞,陈海明,等.无线传感器网络干扰分类识别机制的研究[J].通信学报,2013,34(10):28-36.
[5]向亦宏,朱燕民.无线传感器网络中高效建立干扰模型的研究[J].计算机工程,2014,40(8):1-5.
[6]WEI Xianglin,WANG Qiping,WANG Tongxiang,et al.Jammer localization in multi-hop wireless network:a comprehensive survey[J].IEEE Communications Surveys and Tutorials,2017,19(2):765-799.
[7]VADLAMANI S,EKSIOGLU B,MEDAL H,et al.Jamming attacks on wireless networks:a taxonomic survey[J].International Journal of Production Economics,2016,172:76-94.
[8]XU W,MA K,TRAPPE W,et al.Jamming sensor networks:attack and defense strategies[J].IEEE Network,2006,20(3):41-47.
[9]SUFYAN N,SAQIB N A.Detection of Jamming attacks in 802.11b wireless networks[J].EURASIP Journal on Wireless Communications and Networking,2013,2013(1):15-18.
[10]STRASSER M,DANEV B.Detection of reactive jamming in sensor networks[J].ACM Transactions on Sensor Networks,2010,7(2):26-29.
[11]PELECHRINIS K,YAN G,EIDENBENZ S,et al.Detecting selfish exploitation of carrier sensing in 802.11 net-works[C]//Proceedings of 2009 IEEE INFOCOM.Washington D.C.,USA:IEEE Press,2009:657-665.
[12]LIU D,RAYMER J,FOX A.Efficient and timely jamming detection in wireless sensor networks[C]//Proceedings of the 9th International Conference on Mobile Adhoc and Sensor Systems.Washington D.C.,USA:IEEE Press,2012:335-343.
[13]PUNAL O,AKTAS I,SCHNELKE C J,et al.Machine learning-based jamming detection for IEEE 802.11:design and experimental evaluation[C]//Proceedings of the 15th International Symposium on a World of Wireless,Mobile and Multimedia Networks.Washington D.C.,USA:IEEE Press,2014:1-10.
[14]马春光,姚建盛.ns-3网络模拟器基础与应用[M].北京:人民邮电出版社,2014.
[15]张可,张伟,李炜,等.快速移动环境中上下文感知优化链路状态路由协议[J].计算机科学,2011,38(6):110-113.
编辑吴云芳 |