Mobile communications
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Communication Networks
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
A jamming-resistant MAC protocol for single-hop wireless networks
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
Detecting and mitigating the impact of wideband jammers in IEEE 802.11 WLANs
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Energy-efficient jamming attack in IEEE 802.11 MAC
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
A novel approach to identify insider-based jamming attacks in multi-channel wireless networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
A jamming-resistant MAC protocol for multi-hop wireless networks
DISC'10 Proceedings of the 24th international conference on Distributed computing
Jamming-aware traffic allocation for multiple-path routing using portfolio selection
IEEE/ACM Transactions on Networking (TON)
Computer Networks: The International Journal of Computer and Telecommunications Networking
Performance of IEEE 802.11 under Jamming
Mobile Networks and Applications
Hi-index | 0.00 |
It has long been recognized that complete jamming of wireless networks can be realized by generating continuous noise with sufficient power in the vicinity of the wireless network. There are many disadvantages of this approach including high energy requirements and a high probability of detection. The purpose of this paper is to show that similar jamming effectiveness can be achieved with very low energy requirements and low probability of detection. We discuss various measures of performance for jamming and the role of authentication in denial of service attacks. Then we study and simulate, using OPNET 11.5, the effect of periodic jamming on throughput for an 802.11b network. We add intelligence to the jammer by using knowledge of the protocol and exploiting crucial timings and control packets. Intelligent jamming is shown to be more efficient than continuous jamming in terms of signal duration. The next approach is to use a node or two to exploit the backoff timer to create a denial of service attack. Finally, we discuss how these attacks can be applied to networks with protocols such as MILSTD- 188-220D.