3Firouzbakht K,Noubir G,Salehi M. On the capacity ofrate- adaptive packetized wireless communication linksunder jamming[C] / / Proceedings of the Fifth ACM Con-ference on Security and Privacy in Wireless and MobileNetworks. Tucson,AZ,USA:IEEE,2012:3-14.
4Pelechrinis K,Koufogiannakis C,Krishnamurthy S. Gam-ing the jammer: Is frequency hopping effective- [C] / /Proceedings of the 7th International Conference on Model-ing and Optimization in Mobile,Ad Hoc, and WirelessNetworks. Seoul,Korea:IEEE,2009: 187-196.
5Hanawal M K,Abdel-Rahman M J,Nguyen D,et al.Game Theoretic Anti - jamming Dynamic FrequencyHopping and Rate Adaptation in Wireless Systems[R/OL]. 2013-11-01[2014-02-28]. www2. engr. arizona.edu/ krunz/ TR/ Manjesh_infocom2014. pdf.
6P觟opper C,Strasser M,Capkun S. Jamming - resistantbroadcast communication without shared keys[C] / / Pro-ceedings of the 18th USENIX Security Symposium.Berkeley,CA,USA:IEEE,2009: 231-248.
7Strasser M,P觟pper C,Capkun S, et al. Jamming-resistantKey Establishment using Uncoordinated FrequencyHopping[C] / / Proceedings of 2008 IEEE Symposium onSecurity and Privacy. Oakland,CA:IEEE,2008: 64-78.
8Xu Kaihe,Wang Qian,Ren Kui. Joint UFH and PowerControl for Effective Wireless Anti-Jamming Communica-tion[C] / / Proceedings of IEEE INFOCOM 2012. Orlan-do, Florida:IEEE,2012:738-746.
9Lightfoot L,Zhang Lei,Li Tongtong. Space-Time CodedCollision- Free Frequency Hopping in hostile jamming[C] / / Proceedings of IEEE Milcom 2008. San Diego,CA:IEEE,2008:1-7.
10Liu A,Ning P,Dai H,et al. Defending DSSS - basedbroadcast communication against insider jammers via de-layed seed disclosure[C] / / Proceedings of 2010 IEEEAnnual Computer on Security Applications. Austin,TX:IEEE,2010:367-376.