Wei et al., 2016 - Google Patents
Jammer localization in multi-hop wireless network: A comprehensive surveyWei et al., 2016
- Document ID
- 14504553350099896373
- Author
- Wei X
- Wang Q
- Wang T
- Fan J
- Publication year
- Publication venue
- IEEE Communications Surveys & Tutorials
External Links
Snippet
Various security threats and corresponding countermeasures has been a major concern of the maintainers of multi-hop wireless networks (MHWNs) in recent years. This is accompanied with background advances in wireless link bandwidth and rapid growth …
- 230000004807 localization 0 title abstract description 257
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
- H04W4/023—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
- H04W4/025—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using location based information parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/14—Spectrum sharing arrangements between different networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/24—Cell structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W56/00—Synchronization arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wei et al. | Jammer localization in multi-hop wireless network: A comprehensive survey | |
Pelechrinis et al. | Lightweight jammer localization in wireless networks: System design and implementation | |
Abdalla et al. | UAV-assisted attack prevention, detection, and recovery of 5G networks | |
Zhu et al. | Et tu alexa? when commodity wifi devices turn into adversarial motion sensors | |
Capkun et al. | Secure location verification with hidden and mobile base stations | |
Liu et al. | Exploiting jamming-caused neighbor changes for jammer localization | |
US9807619B2 (en) | Methods and apparatuses for use of simultaneous multiple channels in the dynamic frequency selection band in wireless networks | |
US9622089B1 (en) | Cloud DFS super master systems and methods | |
Liu et al. | Localizing jammers in wireless networks | |
Lazos et al. | SeRLoc: Robust localization for wireless sensor networks | |
Labraoui et al. | Secure DV‐Hop localization scheme against wormhole attacks in wireless sensor networks | |
Manesh et al. | Security threats and countermeasures of MAC layer in cognitive radio networks | |
León et al. | Cooperative detection of primary user emulation attacks in CRNs | |
Liu et al. | Localizing multiple jamming attackers in wireless networks | |
Li et al. | Adversarial localization against wireless cameras | |
US20170149833A1 (en) | Network security systems and methods | |
Kim et al. | All your jammers belong to us—Localization of wireless sensors under jamming attack | |
Cai et al. | Joint reactive jammer detection and localization in an enterprise WiFi network | |
WO2017093724A1 (en) | System and method for detection and isolation of network activity | |
Liu et al. | Wireless jamming localization by exploiting nodes’ hearing ranges | |
García-Otero et al. | Detection of wormhole attacks in wireless sensor networks using range-free localization | |
Liu et al. | Determining the position of a jammer using a virtual-force iterative approach | |
Pelechrinis et al. | Jammer localization in wireless networks: An experimentation-driven approach | |
Liu et al. | Error minimizing jammer localization through smart estimation of ambient noise | |
Lalouani et al. | Countering radiometric signature exploitation using adversarial machine learning based protocol switching |