International Journal of Innovative Science Engineering and Technology (IJISET)
The shared nature of any medium in wireless networks makes it easy for an antagonist to launch a Wireless Denial of Service (WDoS) attack. It demonstrates that such attacks can be very easily accomplished using off-the-shelf equipment. A malicious node can continually transmit a radio signal in order to block any legitimate access to the medium and/or interfere with reception. This is called jamming and the malicious nodes are referred to as jammers. Jamming techniques may vary from normal ones based on the continual transmission of interference signals, to more complicated attacks that aim at exploiting vulnerabilities of the particular protocol used.