期刊文献+

针对无线网络的随机干扰技术研究 被引量:1

The Research of Random Jamming on Wireless Network
下载PDF
导出
摘要 对存在随机干扰时的无线网络性能分析和对网络中存在干扰的检测,是关于无线网络的重要研究内容。本文建立了一个存在干扰机的无线网络二维马尔可夫模型,以概率的形式对无线网络的相关性能进行分析;并在此基础上建立了一个干扰检测模型,通过测量无线网络信道空闲时隙数来推测网络在未受干扰时理论成功发送概率,与实际测量得到的发送成功概率比较得到网络干扰因子,实现了对干扰的检测;利用NS2网络模拟对模型进行了验证。 Performance of wireless network under jamming and how to detect jamming are important researcn areas in wireless network. A two dimension MARKOV model is proposed, through which performance can be analyzed in probability manner. A jamming detection model is proposed by counting the idle slot of wireless channel, the theoretical successful transmission probability can be inferred, then we compare it with the real transmission probability has measured, network jamming factor can be obtained to distinguish jamming. Vali- dation of the model is performed by NS2 network simulator.
出处 《北京电子科技学院学报》 2012年第2期1-8,共8页 Journal of Beijing Electronic Science And Technology Institute
  • 相关文献

参考文献6

  • 1Bianchi, G. , "Performance analysis of the IEEE 802.11 distributed coordination function", IEEE Journal on Se- lected Areas in Communications, 18(3):535-547March 2000.
  • 2M. Mondin ; F. Mesiti ; M. Laddomada; F. Daneshgaran; "Unsaturated Throughput Analysis of IEEE 802. 11 in Presence of Non Ideal Transmission Channel and Capture Effects", IEEE Transactions on Wireless Communications, A- pril 2008, p1276 - 1286.
  • 3Yu - seung Kim, Heejo Lee, "On Classifying and Evaluating the effect of Jamming Attacks", in Proc. ICOIN 2010.
  • 4Geethapriya Thamilarasu, Sumita Mishra and Ramalingam Sridhar, "Improving Reliabilty of Jamming Attack Detec- tion in Ad hoc Networks", International Journal of Communication Networks and Information Security (IJCNIS) vol. 3 No. 1 April 2011.
  • 5E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, B. Thapa, "On the Performance of IEEE 802.11 under Jamming", The 27th Conference on Computer Communications. IEEE INFOCOM 2008.
  • 6Alberto Lopez Toledo, Xiaodong Wang, "Robust Detection of MAC Layer Denial - of - Service Attacks in CSMA/CA Wireless Networks", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL . 3, NO. 3 , SEPTEMBER 2008.

同被引文献8

  • 1LEI Guang, Chadi Assi, Abderrahim Benslimane. MAC layer misbehavior in wireless networks: challen- ges and solutions [C]//IEEE Wireless Communica- tions, 2008 : 6-14.
  • 2Pelechrinis Konstantinos, Koufogiannakis Chrisms, Kxishnamurthy Srikanth V. On the Efficacy of Fre- quency Hopping in Coping with Jamming Attacks in 802. 11 Networks[J]. IEEE Transactions on Wireless Communications, 2010,9 (10) : 3258-3271.
  • 3RaviTeja Chinta, Tan F. Wong, John M. Shea. Ener- gy-Effeicient Jamming Attack in IEEE 802. 11 MAC [ C ]//IEEE Military communication conference 2009JEEE Milcom, 2009.
  • 4Xiaojuan Liao, Dong Hao, Kouich Sakurai. A Taxono- my of game theoretic approaches against attacks in wireless Ad Hoc networks[C]//SCIS 2011, The 2011 Symposium on Cryptography and Information Security. Okura, Japan, 2011 : 25-28.
  • 5Sagduyu, Y. E. , Berry, R. A. , Ephremides, A. Jam- ming games in wireless networks with incomplete infor- mation[J]. 1EEE Communications Magazine, 2011,49 (8) ..112-118.
  • 6Abderrahim Benslimane, Abdelouahid E1 Yakoubi, Mohammed Bouhorma. Analysis of Jamming effects on IEEES02. 11 Wireless Networks[C]//Communication (ICC), 2011 IEEE International Conference on 2011 .. 1- 5.
  • 7Bianchi. G. Performance analysis of the IEEE 802. 11 distributed coordination function[J]. IEEE Journal on Selected Areas in Communications, 2000, 18 (3).. 535- 547.
  • 8张君毅,杨义先.针对无线网络的智能干扰技术研究[J].无线电通信技术,2012,38(6):6-7. 被引量:8

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部