Secure and Continuous Wireless Dispatch Using Lock-Timeout Puzzles

Download Now
Provided by: International Journal of Innovative Science Engineering and Technology (IJISET)
Topic: Security
Format: PDF
The shared nature of any medium in wireless networks makes it easy for an antagonist to launch a Wireless Denial of Service (WDoS) attack. It demonstrates that such attacks can be very easily accomplished using off-the-shelf equipment. A malicious node can continually transmit a radio signal in order to block any legitimate access to the medium and/or interfere with reception. This is called jamming and the malicious nodes are referred to as jammers. Jamming techniques may vary from normal ones based on the continual transmission of interference signals, to more complicated attacks that aim at exploiting vulnerabilities of the particular protocol used.
Download Now

Find By Topic