Mobility

Study on Jammers and Defense Strategies in Wireless Networks

Free registration required

Executive Summary

Wireless networks overcame the limitations of the traditional approaches in the implementation of the wired networks. The number of nodes can be easily extended and provided with then the services of the networks. Amenities of the private networks are risked by the invaders and their activities to disclose the confidential contents. These invaders established a standard mode of attacking by jamming the services upon described functions. The jammers would key in attack packets to the networks claiming to be a reasonable request to block the services of the intended users. Ultimately, the network would continue answering the meaningless queries of the attackers thereby avoiding or making the users to wait indefinitely.

  • Format: PDF
  • Size: 154.99 KB