Have a personal or library account? Click to login
Amn-Pso Method For Jamming Unmanned Aerial Vehicle Network Cover
By: ZHANG Yu,  LIU Feng and  HAN Jie  
Open Access
|Dec 2015

References

  1. R. W. Anwar, M. Bakhtiari, A. Zainal, A. H. Abdullah, and K. N. Qureshi, “Security Issues and Attacks in Wireless Sensor Network”, World Applied Sciences Journal, vol. 30, 2014, pp. 1224-1227.
  2. C.-M. Pintea and P. C. Pop, “Sensitive ants for denial jamming attack on wireless sensor network”, in International Joint Conference SOCO’13-CISIS’13-ICEUTE’13, 2014, pp. 409-418.10.1007/978-3-319-01854-6_42
  3. S. Bhattacharya and T. Başar, “Differential game-theoretic approach to a spatial jamming problem”, in Advances in Dynamic Games, Springer 2013, pp. 245-268.10.1007/978-0-8176-8355-9_13
  4. R. Di Pietro, S. Guarino, N. Verde, J. Domingo-Ferrer, “Security in wireless ad-hoc networks–a survey”, Computer Communications, vol. 51, 2014, pp. 1-20.10.1016/j.comcom.2014.06.003
  5. Z. Lu, W. Y. Wang, and C. Wang, “Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications”, IEEE Transactions on Mobile Computing, vol. 13, pp. 1746-1759, Aug 2014.
  6. N. Lyamin, A. Vinel, M. Jonsson, and J. Loo, “Real-Time Detection of Denial-of-Service Attacks in IEEE 802.11 p Vehicular Networks”, IEEE communications letters, vol. 18, 2014, pp. 110-113.10.1109/LCOMM.2013.102213.132056
  7. M. Poturalski, M. Flury, P. Papadimitratos, J. P. Hubaux, and J. Y. Le Boudec, “Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures”, IEEE Transactions on Wireless Communications, vol. 10, pp. 1334-1344, Apr 2011.
  8. Z. M. Fadlullah, H. Nishiyama, N. Kato, and M. M. Fouda, “Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks”, IEEE Network, vol. 27, pp. 51-56, May-Jun 2013.10.1109/MNET.2013.6523809
  9. Y. T. Tsou, C. S. Lu, and S. Y. Kuo, “MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, vol. 12, pp. 28172829, Jun 2013.
  10. P. Lee, A. Clark, L. Bushnell, and R. Poovendran, “Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach”, in Control of Cyber-Physical Systems, Springer 2013, pp. 161-175.10.1007/978-3-319-01159-2_9
  11. A. Proano and L. Lazos, “Packet-Hiding Methods for Preventing Selective Jamming Attacks”, IE Transactions on Dependable and Secure Computing, vol. 9, pp. 101-114, Jan-Feb 2012.10.1109/TDSC.2011.41
  12. Q. Liu, J. Yin, and S. Yu, “A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology”, in Cyberspace Safety and Security, Springer 2013, pp. 243257.10.1007/978-3-319-03584-0_18
  13. M. Y. Li, I. Koutsopoulos, and R. Poovendran, “Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, vol. 9, pp. 1119-1133, Aug 2010.
  14. H. Pezeshki, X. Y. Zhou, and B. Maham, “Jamming Energy Allocation in Training-Based Multiple Access Systems”, IEEE Communications Letters, vol. 17, pp. 1140-1143, Jun 2013.
  15. Y. Zhang and L. S. Yang, “Triangle and GA Methods for UAVs Jamming”, Mathematical Problems in Engineering, vol. 2014, 2014, p. 8.
Language: English
Page range: 2042 - 2064
Submitted on: Aug 16, 2015
Accepted on: Nov 3, 2015
Published on: Dec 1, 2015
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2015 ZHANG Yu, LIU Feng, HAN Jie, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.