Related references
Note: Only part of the references are listed.Integrity Regions: Authentication through Presence in Wireless Networks
Srdjan Capkun et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2010)
Of malicious motes and suspicious sensors On the efficiency of malicious interference in wireless networks
Seth Gilbert et al.
THEORETICAL COMPUTER SCIENCE (2009)
Wormhole-based antijamming techniques in sensor networks
Mario Cagalj et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2007)
Keyless jam resistance
Leemon C. Baird et al.
2007 IEEE INFORMATION ASSURANCE WORKSHOP (2007)
An evolutionary approach to designing complex spreading codes for DS-CDMA
B Natarajan et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2005)
Denial of service in sensor networks
AD Wood et al.
COMPUTER (2002)