• FIJI: Fighting implicit jamming in 802.11 WLANs 

      Broustis, I.; Pelechrinis, K.; Syrivelis, D.; Krishnamurthy, S. V.; Tassiulas, L. (2009)
      The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take ...
    • Lightweight jammer localization in wireless networks: System design and implementation 

      Pelechrinis, K.; Koutsopoulos, I.; Broustis, I.; Krishnamurthy, S. V. (2009)
      Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is of great importance for restoring normal ...
    • Quantifying the overhead due to routing probes in multi-rate WMNs 

      Broustis, I.; Pelechrinis, K.; Syrivelis, D.; Krishnamurthy, S. V.; Tassiulas, L. (2010)
      The selection of high-throughput routes is a key element towards improving the performance of wireless multihop networks. While several routing metrics have been proposed in the literature, it has been shown that link-quality ...
    • A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks 

      Broustis, I.; Pelechrinis, K.; Syrivelis, D.; Krishnamurthy, S. V.; Tassiulas, L. (2011)
      The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take ...