Introduction to Jamming Attacks and Prevention Techniques Using Honeypots in Wireless Networks

Download Now
Provided by: International Research Association of Computer Science and Technology (IRACST)
Topic: Security
Format: PDF
Built upon a shared wireless medium, wireless networks are susceptible to jamming attacks. These types of attacks can easily be accomplished by an adversary by either bypassing MAC layer protocol or by emitting RF signals. Typically, jamming can be referred as intentional interference attacks on wireless networks. It is an attempt of making the users not possible to use network resources. Jamming attacks are severe Denial-of-service attacks against wireless medium. In this paper, considering the role of wireless adversary, which targets the packets of high importance by emitting radio frequency signals and do not follow underlying network architecture.
Download Now

Find By Topic