期刊文献+

三种不同干扰下CSMA/CA机制的性能分析 被引量:4

Performance Analysis of the Throughput of CSMA/CA Mechanism under Three Different Jamming
在线阅读 下载PDF
导出
摘要 CSMA/CA机制是一种应用广泛的无线网络MAC层接入方式,对其攻击手段的研究很多,但是对在攻击下CSMA/CA机制的网络性能分析研究不多。论文建立了一个简化版离散马尔科夫模型,对随机干扰、反应式干扰和智能干扰三种手段进行定量比较,得出干扰效果高低。 The CSMA /CA mechanism is a kind of access way and widely used in MAC layer of wireless network .There are a lot of attacking means for CSMA /CA mechanism ,but a less study for the performance analysis of the throughput of CSMA /CA mechanism under jamming .In this paper ,a discrete-time Markov chain analysis is used to derive formulae for the saturation throughput of memory less ,reactive and intelligent jamming .Then three mathematical saturation throughput are compared ,and the result is obtained.
机构地区 电子工程学院
出处 《舰船电子工程》 2016年第3期62-67,共6页 Ship Electronic Engineering
关键词 干扰 性能分析 CSMA/CA jamming CSMA/CA performance analysis
  • 相关文献

参考文献9

  • 1LEI Guang, Chadi Assi, Abderrahim Benslimane. MAC layer misbehavior in wireless networks: challen- ges and solutions [C]//IEEE Wireless Communica- tions, 2008 : 6-14.
  • 2Pelechrinis Konstantinos, Koufogiannakis Chrisms, Kxishnamurthy Srikanth V. On the Efficacy of Fre- quency Hopping in Coping with Jamming Attacks in 802. 11 Networks[J]. IEEE Transactions on Wireless Communications, 2010,9 (10) : 3258-3271.
  • 3RaviTeja Chinta, Tan F. Wong, John M. Shea. Ener- gy-Effeicient Jamming Attack in IEEE 802. 11 MAC [ C ]//IEEE Military communication conference 2009JEEE Milcom, 2009.
  • 4Xiaojuan Liao, Dong Hao, Kouich Sakurai. A Taxono- my of game theoretic approaches against attacks in wireless Ad Hoc networks[C]//SCIS 2011, The 2011 Symposium on Cryptography and Information Security. Okura, Japan, 2011 : 25-28.
  • 5Sagduyu, Y. E. , Berry, R. A. , Ephremides, A. Jam- ming games in wireless networks with incomplete infor- mation[J]. 1EEE Communications Magazine, 2011,49 (8) ..112-118.
  • 6Abderrahim Benslimane, Abdelouahid E1 Yakoubi, Mohammed Bouhorma. Analysis of Jamming effects on IEEES02. 11 Wireless Networks[C]//Communication (ICC), 2011 IEEE International Conference on 2011 .. 1- 5.
  • 7Bianchi. G. Performance analysis of the IEEE 802. 11 distributed coordination function[J]. IEEE Journal on Selected Areas in Communications, 2000, 18 (3).. 535- 547.
  • 8张君毅,杨义先.针对无线网络的随机干扰技术研究[J].北京电子科技学院学报,2012,20(2):1-8. 被引量:1
  • 9张君毅,杨义先.针对无线网络的智能干扰技术研究[J].无线电通信技术,2012,38(6):6-7. 被引量:9

二级参考文献12

  • 1Bianchi, G. , "Performance analysis of the IEEE 802.11 distributed coordination function", IEEE Journal on Se- lected Areas in Communications, 18(3):535-547March 2000.
  • 2M. Mondin ; F. Mesiti ; M. Laddomada; F. Daneshgaran; "Unsaturated Throughput Analysis of IEEE 802. 11 in Presence of Non Ideal Transmission Channel and Capture Effects", IEEE Transactions on Wireless Communications, A- pril 2008, p1276 - 1286.
  • 3Yu - seung Kim, Heejo Lee, "On Classifying and Evaluating the effect of Jamming Attacks", in Proc. ICOIN 2010.
  • 4Geethapriya Thamilarasu, Sumita Mishra and Ramalingam Sridhar, "Improving Reliabilty of Jamming Attack Detec- tion in Ad hoc Networks", International Journal of Communication Networks and Information Security (IJCNIS) vol. 3 No. 1 April 2011.
  • 5E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, B. Thapa, "On the Performance of IEEE 802.11 under Jamming", The 27th Conference on Computer Communications. IEEE INFOCOM 2008.
  • 6Alberto Lopez Toledo, Xiaodong Wang, "Robust Detection of MAC Layer Denial - of - Service Attacks in CSMA/CA Wireless Networks", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL . 3, NO. 3 , SEPTEMBER 2008.
  • 7KIM Yu-seung,LEE Heejo. On Classifying and Evaluating the effect of Jamming Attacks [ C ] // The 24th edition of the international conference on information Networking (ICOIN) 2010 ,Jan 27 - 29,2010:21 - 25.
  • 8Proano Alejandro, Loukas Lazos. Selective Jamming At- tacks in Wireless Networks [ C ] //2010 IEEE Internation- al Conference on Communications (ICC) ,2010:1 -6.
  • 9ZHANG Zhi-guo, WU Jing-qi, DENG Jing, QIU Mei- kang. Jamming ACK Attack to Wireless Networks and a Mitigation Approach [ C ] // IEEE Global Telecommunica- tions Conference, IEEE GLOBECOM 2008 : 1 - 5.
  • 10CHINTA R T,WONG T F,SHEA J M. Energy-Effeicient Jamming Attack in IEEE 802. ll MAC [ C] //IEEE Military communication conference 2009, IEEE Milcom 2009 : 1 - 7.

共引文献8

同被引文献27

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部