NOVEL MITIGATION METHODS AGAINST REACTIVE JAMMING ATTACK: THEORETICAL AND PRACTICAL SOLUTIONS By INCHEOL SHIN A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY

نویسندگان

  • Incheol Shin
  • Randy Y. C. Chow
  • Panos M. Pardalos
چکیده

of Dissertation Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy NOVEL MITIGATION METHODS AGAINST REACTIVE JAMMING ATTACK: THEORETICAL AND PRACTICAL SOLUTIONS By Incheol Shin August 2010 Chair: My Tra Thai Major: Computer Engineering Wireless Sensor Networks (WSNs) consist of many spatially deployed sensor devices to cooperatively monitor selected target locations and communicate with base stations. WSNs have potential applications in various complex environments such as military surveillance, health-care systems, disaster area monitoring and etc. Due to the requirement of large-scale and real-time data processing in WSNs, security is critical in many sensor network applications. The wireless communication of sensor devices in resource-constrained WSNs leads to many challenging and intriguing security-sensitive problems that cannot be handled using conventional security solutions. Especially, since jammers attack the broadcast nature of the transmission medium by injecting interference signals, they are considered the most critical and fatally adversarial threats to subvert or disrupt the networks. Jamming attacks do not have to modify communication packets or compromise any sensors in order to launch, which makes them difficult to detect and defend against. Existing countermeasures against such attacks either consider sensor nodes equipped with sophisticated hardware, which is infeasible for low cost resource constraint WSNs, or have high overhead in term of time and message complexity and energy consumption. However, to overcome the problems in existing methods against reactive jamming attack, this dissertation introduces a novel approach by identifying the

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CAPACITY ANALYSIS AND CROSS-LAYER PROTOCOL DESIGN IN WIRELESS NETWORKS By PAN LI A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY

of Dissertation Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy CAPACITY ANALYSIS AND CROSS-LAYER PROTOCOL DESIGN IN WIRELESS NETWORKS By Pan Li August 2009 Chair: Yuguang Fang Major: Electrical and Computer Engineering Today we have witnessed the proliferation of wireless networks including wireless...

متن کامل

LDPC-BASED SECRET-SHARING SCHEMES FOR WIRETAP CHANNELS By CHAN WONG WONG A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY

of Dissertation Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy LDPC-BASED SECRET-SHARING SCHEMES FOR WIRETAP CHANNELS By Chan Wong Wong December 2011 Chair: John M. Shea Cochair: Tan F. Wong Major: Electrical and Computer Engineering This dissertation examines the practical design of secret-sharing ...

متن کامل

Abstract of " Simulated Annealing Based Local Search for Sport Scheduling Problems " by Ioannis Simulated Annealing Based Local Search for Sport Scheduling Problems

of “Simulated Annealing Based Local Search for Sport Scheduling Problems” by Ioannis Vergados, Ph.D., Brown University, May 2007. Sport Scheduling is an important area of Combinatorial Optimization of great practical and theoretical significance, that features some extremely challenging optimization problems. This thesis focuses on two important sport scheduling problems: the Break Minimization...

متن کامل

Optimization Techniques for Entropy-based Moment Models of Linear Transport

Title of dissertation: OPTIMIZATION TECHNIQUES FOR ENTROPY-BASED MOMENT MODELS OF LINEAR TRANSPORT Graham West Alldredge, Doctor of Philosophy, 2012 Dissertation directed by: Professor André Tits Department of Electrical and Computer Engineering Kinetic equations are used to model many physical phenomena, including gas dynamics, semiconductors, radiative transport, and more. However, high dimen...

متن کامل

Investigating the Compliance of Emergency Medicine Technician Curriculum with Job Requirements from the Viewpoint of the Workers at Mashhad University of Medical Sciences in 2015

Abstract Introduction: Due to some rapid changes in medical knowledge, it is recommended to revise the curriculum of the health allied disciplines periodically. The workers’ viewpoints about the compliance of the curriculum with their actual needs may be one of the valuable sources for the future revisions. This study is conducted to attain the medical emergency workers’ viewpoints about their ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010