3Akyildiz Ian F, Wang Xudong, Wang Weilin. Wireless mesh networks:a survey[J].Computer Networks,2004(4).
4Xhafa F, Sanchez C, Barolli L. Genetic algorithms for efficient placement of router nodes in wireless mesh networks[C]//Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications,2010.
二级参考文献12
1Xu Wenyuan,Trappe Wade,Zhang Yanyong,et al. Thefeasibility of launching and detecting jamming attacksin wireless networks [A]. Proceedings of the 6 th ACMInternational Symposium on Mobile Ad Hoc Networkingand Computing ( MobiHoc05 ) [ C ]. Urbana-Cham-paign,US: ACM ,2005:46-57.
2Timothy X Brown, Jesse E James, Amita Sethi.Jamming and sensing of encrypted wireless ad hocnetworks [ A ]. Proc of the 7 th ACM International Sympon Mobile Ad Hoc Networking and Computing(MobiHoc 2006) [ C ]. New York, US: ACM Press,2006:120-130.
3Li Mingy an, Iordanis Koutsopoulos,Radha Poovendran.Optimal jamming attacks and network defense policiesin wireless sensor networks [ A ]. The 26th IEEEInternational Conference on Computer Communications(Infocom 2007 ) [ C ]. Achorage,US : IEEE,2007 :1307-1315.
4Devi L, Suganthi A. Denial of service attacks inwireless networks : The case of jammers [ J ].International Journal of Computer Science and MobileComputing, 2014,3 (1) : 548-558.
5Hinrich J H, Willkomm D. An empirical study of urban2. 4 GHz RF noise from the perspective of a bodysensor network[ A]. Proceedings of the 2012 Ninth In-ternational Conference on Wearable and ImplantableBody Sensor Networks( BSN) [ C] . London,UK: IEEEComputer Society, 2012 : 73 -78.
6Zhang Zhiguo, Wu Jingqi, Deng Jing, et al. JammingACK attack to wireless networks and a mitigationapproach [ A ] . Proceedings of the 2008 Global Tele-communications of Conference [ C ]. New Orleans, US :IEEE ,2008:1-5.
7Thuente D J, Acharya M. Intelligent jamming inwireless networks with applications to 802. 11B andother Networks [A] . Proc of 2006 IEEE Conference onMilitary Communications[C]. Washing DC,US:IEEE,2006:1075-1081.