Back to Results
First PageMeta Content
Cyberwarfare / Wireless networking / Wireless sensor network / ALOHAnet / Denial-of-service attack / Entailment / Network topology / Determinacy / Logic / Denial-of-service attacks / Media Access Control


Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li
Add to Reading List

Document Date: 2007-01-26 19:25:46


Open Document

File Size: 147,13 KB

Share Result on Facebook

City

Wormhole / /

Company

Prentice-Hall / Army Research Laboratory / U.S. Army Research Laboratory / /

/

Facility

Electrical Engineering University of Washington / Communication Engineering University of Thessaly Volos / Electrical Engineering University of Washington Seattle / U.S. Army Research Laboratory / Army Research Laboratory / /

IndustryTerm

energy constraint / formulation energy limitations / wireless entities / energy resources / low-energy attacks / dense sensor network / wireless denial / sensor network protocols / energy consumption / energy limitations / Sensor networks / feasible solution / consumed energy / given energy limitations / Wireless Sensor Networks Mingyan Li Iordanis Koutsopoulos Radha Poovendran Network / account potential energy constraints / deployed miniature energy-constrained devices / type access control protocol / energy saving factor / machinery / access protocols / wireless-sensor networks / wireless sensor network / higher energy / wireless sensor networks / energy threshold / transmission energy / detection algorithm / Wireless Comm / Wireless Security / wireless transmission / data wireless / wireless networks / numerical solutions / waste energy / sensor network / energy / /

OperatingSystem

DoS / /

Organization

University of Washington / Electrical Engineering University of Washington Seattle / Washington / United States Army / U.S. Government / European Commission / Carnegie Mellon / Computer and Communication Engineering University of Thessaly Volos / /

Person

A. G. Tartakovsky / J. Jung / V / V. V. Veeravalli / Vladimir P. Dragalin / Washington Seattle / Radha Poovendran / /

Position

Em /Pm / Prime Minister / power level Pm / controlling transmission power Pm / If Em /Pm / missed detection PM / /

Technology

frequency hopping / Mobile Computing / Aloha type access control protocol / sensor network protocols / access protocols / wireless sensor network MAC protocols / detection algorithm / MAC protocols / /

SocialTag