3GPP: 3GPP release 16. http://www.3gpp.org/release-16
3GPP: Evolved universal terrestrial radio access (E-UTRA); physical layer; measurements. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2428
Adhikary, A., Lin, X., Eric Wang, Y.P.: Performance evaluation of NB-IoT coverage. In: IEEE Vehicular Technology Conference. ISSN 1550-2252 (2016). https://doi.org/10.1109/VTCFall.2016.7881160
Andres-Maldonado, P., Ameigeiras, P., Prados-Garzon, J., Navarro-Ortiz, J., Lopez-Soler, J.M.: Narrowband IoT data transmission procedures for massive machine-type communications. IEEE Network 31(6), 8–15 (2017). https://doi.org/10.1109/MNET.2017.1700081
CrossRef
Google Scholar
Beyene, Y.D., Jantti, R., Ruttik, K., Iraji, S.: On the performance of narrow-band internet of things (NB-IoT). In: IEEE Wireless Communications and Networking Conference, WCNC. ISSN 1525-3511 (2017). https://doi.org/10.1109/WCNC.2017.7925809
Buttyán, L., Csik, L.: Security analysis of reliable transport layer protocols for wireless sensor networks. In: 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 419–424 (2010). https://doi.org/10.1109/PERCOMW.2010.5470633
Cao, X., Shila, D.M., Cheng, Y., Yang, Z., Zhou, Y., Chen, J.: Ghost-in-ZigBee: energy depletion attack on ZigBee-based wireless networks. IEEE Internet Things J. 3(5), 816–829 (2016). https://doi.org/10.1109/JIOT.2016.2516102
CrossRef
Google Scholar
Chen, M., Miao, Y., Hao, Y., Hwang, K.: Narrow band Internet of Things. IEEE Access 5, 20557–20577 (2017). https://doi.org/10.1109/ACCESS.2017.2751586
CrossRef
Google Scholar
Hoglund, A., et al.: 3GPP release-16 preconfigured uplink resources for LTE-M and NB-IoT. IEEE Commun. Stand. Mag. 4(2), 50–56 (2020). https://doi.org/10.1109/MCOMSTD.001.2000003
CrossRef
Google Scholar
Jover, R.P., Lackey, J., Raghavan, A.: Enhancing the security of LTE networks against jamming attacks. EURASIP J. Inf. Secur. 2014(1), 7 (2014). https://doi.org/10.1186/1687-417X-2014-7
CrossRef
Google Scholar
Keysight: Downlink channel parameters (NB-IoT). http://rfmw.em.keysight.com/wireless/helpfiles/89600B/WebHelp/Subsystems/nbiot/Content/nbiot_dlcontrolchannelproperties.htm
Krejčí, R., Hujňák, O., Švepeš, M.: Security survey of the IoT wireless protocols. In: 2017 25th Telecommunication Forum (TELFOR). pp. 1–4 (2017). https://doi.org/10.1109/TELFOR.2017.8249286
Liberg, O., Sundberg, M., Wang, Y.P.E., Bergman, J., Sachs, J., Wikström, G.: Cellular Internet of Things: From Massive Deployments to Critical 5G Applications. Academic Press, Cambridge (2020)
Google Scholar
Lin, X., Adhikary, A., Eric Wang, Y.P.: Random access preamble design and detection for 3GPP narrowband IoT systems. IEEE Wirel. Commun. Lett. 5(6), 640–643 (2016). https://doi.org/10.1109/LWC.2016.2609914, http://ieeexplore.ieee.org/document/7569029/
Martiradonna, S., Piro, G., Boggia, G.: On the evaluation of the NB-IoT random access procedure in monitoring infrastructures. Sensors 19(14), 3237 (2019). https://doi.org/10.3390/s19143237, https://www.mdpi.com/1424-8220/19/14/3237
Matz, A.P., Fernandez-Prieto, J.A., Cañada-Bago, J., Birkel, U.: A systematic analysis of narrowband IoT quality of service. Sensors 20(6), 1636 (2020). https://doi.org/10.3390/s20061636, https://www.mdpi.com/1424-8220/20/6/1636
Mwakwata, C.B., Malik, H., Alam, M.M., Moullec, Y.L., Parand, S., Mumtaz, S.: Narrowband Internet of Things (NB-IoT): from physical (PHY) and media access control (MAC) layers perspectives. Sensors 19(11), 2613 (2019). https://doi.org/10.3390/s19112613
CrossRef
Google Scholar
Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using channel hopping to increase 802.11 resilience to jamming attacks, pp. 2526–2530 (2007). https://doi.org/10.1109/INFCOM.2007.314
Nokia: Nokia siemens network. RF measurements quantities and optimization. https://www.academia.edu/8902974/Soc_Classification_level_1_Nokia_Siemens_Networks_Presentation_Author_Date_RF_measurements_quantities_and_optimization_Soc_Classification_level_2_Nokia_Siemens_Networks_Presentation_Author_Date_Content?auto=download
Pielli, C., Chiariotti, F., Laurenti, N., Zanella, A., Zorzi, M.: A game-theoretic analysis of energy-depleting jamming attacks. In: 2017 International Conference on Computing, Networking and Communications (ICNC), pp. 100–104 (2017). https://doi.org/10.1109/ICCNC.2017.7876109
Pirayesh, H., Zeng, H.: Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey (2021)
Google Scholar
Pirretti, M., Zhu, S., Vijaykrishnan, N., McDaniel, P., Kandemir, M., Brooks, R.: The sleep deprivation attack in sensor networks: analysis and methods of defense. Int. J. Distrib. Sens. Networks 2(3), 267–287 (2006)
CrossRef
Google Scholar
Pu, C.: Energy depletion attack against routing protocol in the Internet of Things. In: 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC), pp. 1–4 (2019). https://doi.org/10.1109/CCNC.2019.8651771
Shakhov, V.: On a new type of attack in wireless sensor networks: depletion of battery. In: 2016 11th International Forum on Strategic Technology (IFOST), pp. 491–494 (2016). https://doi.org/10.1109/IFOST.2016.7884162
Torrieri, D.: Frequency hopping with multiple frequency-shift keying and hard decisions. IEEE Trans. Commun. 32, 574–582 (1984). https://doi.org/10.1109/TCOM.1984.1096105
CrossRef
Google Scholar
Vasserman, E.Y., Hopper, N.: Vampire attacks: draining life from wireless ad hoc sensor networks. IEEE Trans. Mob. Comput. 12(2), 318–332 (2013). https://doi.org/10.1109/TMC.2011.274
CrossRef
Google Scholar
Xu, J., Yao, J., Wang, L., Ming, Z., Wu, K., Chen, L.: Narrowband internet of things: evolutions, technologies, and open issues. IEEE Internet Things J. 5(3), 1449–1462 (2018). https://doi.org/10.1109/JIOT.2017.2783374
CrossRef
Google Scholar