ENHANCED LOAD CONTROL AND POWER MONITORING SYSTEM USING DHCP ALGORITHM IN WIRELESS ENVIRONMENT
Abstract
Keywords
Full Text:
PDFReferences
T.X. Brown, J.E. James, A. Sethi, "Jamming and Sensing of Encrypted Wireless Ad Hoc Networks", Proc. ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 120-130, 2006.
M. Cagalj, S. Capkun, J.-P. Hubaux, "Wormhole-Based Anti-Jamming Techniques in Sensor Networks", IEEE Trans. Mobile Computing, vol. 6, no. 1, pp. 100-114, Jan. 2007.
A. Chan, X. Liu, G. Noubir, B. Thapa, "Control Channel Jamming: Resilience and Identification of Traitors", Proc. IEEE Int'l Symp. Information Theory (ISIT), 2007.
T. Dempsey, G. Sahin, Y. Morton, C. Hopper, "Intelligent Sensing and Classification in Ad Hoc Networks: A Case Study", IEEE Aerospace and Electronic Systems Magazine, vol. 24, no. 8, pp. 23-30, Aug. 2009.
Y. Desmedt, "Broadcast Anti-Jamming Systems", Computer Networks, pp. 223-236, Feb. 2001.
K. Gaj, P. Chodowiec, Cryptographic Engineering, pp. 235-294, 2009.
T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages 120–130, 2006.
M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders. Reactive jamming in wireless networks: How realistic is the threat? In Proceedings of WiSec, 2011.
W. Xu, W. Trappe, Y. Zhang, and T.Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of MobiHoc, pages 46–57, 2005.
Akyildiz, I. F., Wang, W., & Wang, W. (2005, January). Wireless mesh networks: a survey. Computer Networks Journal, 47(4), 445-487. [6] D. Stinson. Cryptography: theory and practice. CRC press, 2006.
Eriksson, J. and Koivunen, V.: Identi¯ability, separability, and uniqueness of linear ica models. IEEE Signal Processing Letters, 11(7), July 2004.[8] P. Tague, M. Li, and R. Poovendran. Mitigation
Denning, D., and Denning, P.J.: 'Data security', ACM Comput. Surveys, 1979, 11, pp. 227-250 [2] A Role-Based Trusted Network Provides Pervasive Security and Compliance - interview with JayshreeUllal, senior VP of Cisco.
DOI: https://doi.org/10.26483/ijarcs.v9i2.5647
Refbacks
- There are currently no refbacks.
Copyright (c) 2018 International Journal of Advanced Research in Computer Science

