Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 4 SI
Page No. 3753 - 3757

Cross Layer Security Approach Using Friendly Jammers in Wireless Networks

Authors : K. Sivakumar and K.A. Parthasarathy

References

Ding, X., T. Song, Y. Zou and X. Chen, 2016. Security-reliability tradeoff for friendly Jammer assisted user-pair selection in the face of multiple eavesdroppers. IEEE. Access, 4: 8386-8393.
CrossRef  |  Direct Link  |  

Ji, S., T. Chen and S. Zhong, 2015. Wormhole attack detection algorithms in wireless network coding systems. IEEE. Trans. Mobile Comput., 14: 660-674.
CrossRef  |  Direct Link  |  

Li, J., H. Lu and M. Guizani, 2015. ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distributed Syst., 26: 938-948.
CrossRef  |  Direct Link  |  

Lou, X., H. Yao, C.W. Tan and J. Wang, 2015. Vander: Efficient cooperative watchdog monitoring for Lossy wireless network coding. IEEE. Trans. Veh. Technol., 64: 702-713.
CrossRef  |  Direct Link  |  

Lv, L., J. Chen, L. Yang and Y. Kuo, 2017. Improving physical layer security in untrusted relay networks: Cooperative jamming and power allocation. IET. Commun., 11: 393-399.
CrossRef  |  Direct Link  |  

Pelechrinis, K., M. Iliofotou and S.V. Krishnamurthy, 2011. Denial of service attacks in wireless networks: The case of jammers. IEEE. Commun. Surv. Tutorials, 13: 245-257.
CrossRef  |  Direct Link  |  

Proano, A. and L. Lazos, 2012. Packet-hiding methods for preventing selective jamming attacks. IEEE. Trans. Depend. Secure Comput., 9: 101-114.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved