Classification Methods for Detecting Jamming Attacks

Download Now
Provided by: International Journal for Development of Computer Science & Technology (IJDCST)
Topic: Security
Format: PDF
Adversary disrupts victim's communication channels through jamming in wireless ad hoc network governed by reactive protocols. Although the attack models are classified as both external and internal with the later being more serious because the \"Always-on\" strategy employed in external model has several disadvantages. First, the adversary has to expend a significant amount of energy to jam frequency bands of interest. Second, the continuous presence of unusually high interference levels makes this type of attacks easy to detect.
Download Now

Find By Topic