Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques

Provided by: International Journal of Advanced Networking and Applications (IJANA)
Topic: Security
Format: PDF
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam. This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service (DoS) attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model. However, adversaries with internal information of protocol specifications and network secrets will launch low effort jam attacks that are troublesome to notice and counter. During this paper, the authors have a tendency to address the matter of jamming attacks in wireless networks.

Find By Topic