Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks
From MaRDI portal
Publication:1004318
DOI10.1016/J.TCS.2008.10.008zbMath1157.68013OpenAlexW2147223437MaRDI QIDQ1004318
Rachid Guerraoui, Calvin Newport
Publication date: 2 March 2009
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2008.10.008
Network design and communication in computer systems (68M10) Applications of game theory (91A80) Reliability, testing and fault tolerance of networks and computer systems (68M15)
Related Items (12)
Packet latency of deterministic broadcasting in adversarial multiple access channels ⋮ Sade: competitive MAC under adversarial SINR ⋮ Adaptive Scheduling Over a Wireless Channel Under Constrained Jamming ⋮ Competitive throughput in multi-hop wireless networks despite adaptive jamming ⋮ Adaptive packet scheduling over a wireless channel under constrained jamming ⋮ Adversarial multiple access channels with individual injection rates ⋮ Sleeping on the job: energy-efficient and robust broadcast for radio networks ⋮ Coordination Problems in Ad Hoc Radio Networks ⋮ Optimistically tuning synchronous Byzantine consensus: another win for null messages ⋮ Secure and self-stabilizing clock synchronization in sensor networks ⋮ A resource-competitive jamming defense ⋮ Fast Nonadaptive Deterministic Algorithm for Conflict Resolution in a Dynamic Multiple-Access Channel
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Broadcasting with locally bounded byzantine faults
- SPINS: Security protocols for sensor networks
- Round robin is optimal for fault-tolerant broadcasting on wireless networks
- Fault-Tolerant Broadcasting in Radio Networks
- The do-all problem in broadcast networks
- On reliable broadcast in a radio network
- On selection problem in radio networks
- Feasibility and complexity of broadcasting with random transmission failures
- Broadcast in radio networks tolerating byzantine adversarial behavior
This page was built for publication: Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks