Security Investigate

Layer Model for Reducing Malware Jamming Attacks

Download now Free registration required

Executive Summary

Wireless connectivity huge range results it exposed to selective interference attacks, well known as jamming. The thought of interrupting with wireless transmissions will form as a platform and increases of denial-of-service attacks on wireless connectivity. As a critical situation, jamming has been known under an external threat model. Moreover, antagonist of perfect skills of protocol requirements and network confidential things makes invisible jamming attacks that won't come under notice. In this paper, the authors identify crisis of selective jamming attacks in wireless connectivity. Such attacks, the attacker work on these attacks very less time only, gives most preference to the information which was passed through messages.

  • Format: PDF
  • Size: 458.37 KB