Open Access Open Access  Restricted Access Subscription Access

Counterattack On DoS Attack In Wireless Communication Due To Jammers


 

The commodity of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. All current research work demonstrates that such attacks can easily be accomplished. For example a jammer can continually transmit a radio signal in order to block any access to the medium by legitimate wireless nodes. Jamming techniques can vary, from simple ones based on the continual transmission of interference signals, to more sophisticated that rely on exploiting the protocol used for communication among wireless devices. In this survey we present a detailed reference to all jamming attacks been recorded in literature since now. In addition, we illustrate various techniques that were introduced in order to detect the presence of an adversary node as well as the mechanisms proposed for protecting the network from such attack.


Keywords

DoS, DDoS, DDRS
User
Notifications
Font Size

Abstract Views: 138

PDF Views: 0




  • Counterattack On DoS Attack In Wireless Communication Due To Jammers

Abstract Views: 138  |  PDF Views: 0

Authors

Abstract


The commodity of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. All current research work demonstrates that such attacks can easily be accomplished. For example a jammer can continually transmit a radio signal in order to block any access to the medium by legitimate wireless nodes. Jamming techniques can vary, from simple ones based on the continual transmission of interference signals, to more sophisticated that rely on exploiting the protocol used for communication among wireless devices. In this survey we present a detailed reference to all jamming attacks been recorded in literature since now. In addition, we illustrate various techniques that were introduced in order to detect the presence of an adversary node as well as the mechanisms proposed for protecting the network from such attack.


Keywords


DoS, DDoS, DDRS