[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Wei et al., 2016 - Google Patents

Jammer localization in multi-hop wireless network: A comprehensive survey

Wei et al., 2016

Document ID
14504553350099896373
Author
Wei X
Wang Q
Wang T
Fan J
Publication year
Publication venue
IEEE Communications Surveys & Tutorials

External Links

Snippet

Various security threats and corresponding countermeasures has been a major concern of the maintainers of multi-hop wireless networks (MHWNs) in recent years. This is accompanied with background advances in wireless link bandwidth and rapid growth …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • H04W4/023Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • H04W4/025Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/24Cell structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W56/00Synchronization arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Similar Documents

Publication Publication Date Title
Wei et al. Jammer localization in multi-hop wireless network: A comprehensive survey
Pelechrinis et al. Lightweight jammer localization in wireless networks: System design and implementation
Abdalla et al. UAV-assisted attack prevention, detection, and recovery of 5G networks
Zhu et al. Et tu alexa? when commodity wifi devices turn into adversarial motion sensors
Capkun et al. Secure location verification with hidden and mobile base stations
Liu et al. Exploiting jamming-caused neighbor changes for jammer localization
US9807619B2 (en) Methods and apparatuses for use of simultaneous multiple channels in the dynamic frequency selection band in wireless networks
US9622089B1 (en) Cloud DFS super master systems and methods
Liu et al. Localizing jammers in wireless networks
Lazos et al. SeRLoc: Robust localization for wireless sensor networks
Labraoui et al. Secure DV‐Hop localization scheme against wormhole attacks in wireless sensor networks
Manesh et al. Security threats and countermeasures of MAC layer in cognitive radio networks
León et al. Cooperative detection of primary user emulation attacks in CRNs
Liu et al. Localizing multiple jamming attackers in wireless networks
Li et al. Adversarial localization against wireless cameras
US20170149833A1 (en) Network security systems and methods
Kim et al. All your jammers belong to us—Localization of wireless sensors under jamming attack
Cai et al. Joint reactive jammer detection and localization in an enterprise WiFi network
WO2017093724A1 (en) System and method for detection and isolation of network activity
Liu et al. Wireless jamming localization by exploiting nodes’ hearing ranges
García-Otero et al. Detection of wormhole attacks in wireless sensor networks using range-free localization
Liu et al. Determining the position of a jammer using a virtual-force iterative approach
Pelechrinis et al. Jammer localization in wireless networks: An experimentation-driven approach
Liu et al. Error minimizing jammer localization through smart estimation of ambient noise
Lalouani et al. Countering radiometric signature exploitation using adversarial machine learning based protocol switching