2Firouzbakht K,Noubir G,Salehi M. On the capacity ofrate- adaptive packetized wireless communication linksunder jamming[C] / / Proceedings of the Fifth ACM Con-ference on Security and Privacy in Wireless and MobileNetworks. Tucson,AZ,USA:IEEE,2012:3-14.
3Pelechrinis K,Koufogiannakis C,Krishnamurthy S. Gam-ing the jammer: Is frequency hopping effective- [C] / /Proceedings of the 7th International Conference on Model-ing and Optimization in Mobile,Ad Hoc, and WirelessNetworks. Seoul,Korea:IEEE,2009: 187-196.
4Hanawal M K,Abdel-Rahman M J,Nguyen D,et al.Game Theoretic Anti - jamming Dynamic FrequencyHopping and Rate Adaptation in Wireless Systems[R/OL]. 2013-11-01[2014-02-28]. www2. engr. arizona.edu/ krunz/ TR/ Manjesh_infocom2014. pdf.
5P觟opper C,Strasser M,Capkun S. Jamming - resistantbroadcast communication without shared keys[C] / / Pro-ceedings of the 18th USENIX Security Symposium.Berkeley,CA,USA:IEEE,2009: 231-248.
6Strasser M,P觟pper C,Capkun S, et al. Jamming-resistantKey Establishment using Uncoordinated FrequencyHopping[C] / / Proceedings of 2008 IEEE Symposium onSecurity and Privacy. Oakland,CA:IEEE,2008: 64-78.
7Xu Kaihe,Wang Qian,Ren Kui. Joint UFH and PowerControl for Effective Wireless Anti-Jamming Communica-tion[C] / / Proceedings of IEEE INFOCOM 2012. Orlan-do, Florida:IEEE,2012:738-746.
8Lightfoot L,Zhang Lei,Li Tongtong. Space-Time CodedCollision- Free Frequency Hopping in hostile jamming[C] / / Proceedings of IEEE Milcom 2008. San Diego,CA:IEEE,2008:1-7.
9Liu A,Ning P,Dai H,et al. Defending DSSS - basedbroadcast communication against insider jammers via de-layed seed disclosure[C] / / Proceedings of 2010 IEEEAnnual Computer on Security Applications. Austin,TX:IEEE,2010:367-376.
10Lazos L,Liu Sisi,Krunz M. Mitigating control-channeljamming attacks in multi-channel ad hoc networks[C] / /Proceedings of the ACM WiSec 2009 Conference. [S.l.]:ACM,2009:169-180.