@affitz

Denial of Service Attacks in Wireless Networks: The Case of Jammers

, , and . IEEE Communications Surveys & Tutorials, 13 (2): 245-257 (2011)
DOI: 10.1109/SURV.2011.041110.00022

Abstract

The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such attacks can be very easily accomplished using off-the-shelf equipment. To give a simple example, a malicious node can continually transmit a radio signal in order to block any legitimate access to the medium and/or interfere with reception. This act is called jamming and the malicious nodes are referred to as jammers. Jamming techniques vary from simple ones based on the continual transmission of interference signals, to more sophisticated attacks that aim at exploiting vulnerabilities of the particular protocol used. In this survey, we present a detailed up-to-date discussion on the jamming attacks recorded in the literature. We also describe various techniques proposed for detecting the presence of jammers. Finally, we survey numerous mechanisms which attempt to protect the network from jamming attacks. We conclude with a summary and by suggesting future directions.

Description

IEEE Xplore - Denial of Service Attacks in Wireless Networks: The Case of Jammers

Links and resources

Tags

community

  • @dblp
  • @affitz
@affitz's tags highlighted