An introduction to signal detection and estimation (2nd ed.)
An introduction to signal detection and estimation (2nd ed.)
Electronic Warfare in the Information Age
Electronic Warfare in the Information Age
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Denial of Service in Sensor Networks
Computer
IEEE Security and Privacy
JAM: A Jammed-Area Mapping Service for Sensor Networks
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
Distributed localization in wireless sensor networks: a quantitative comparison
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Wireless sensor networks
Low-power DoS attacks in data wireless LANs and countermeasures
ACM SIGMOBILE Mobile Computing and Communications Review
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
Versatile low power media access for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
IEEE Network: The Magazine of Global Internetworking
MPEG-4 and H.263 video traces for network performance evaluation
IEEE Network: The Magazine of Global Internetworking
Proceedings of the 4th ACM workshop on Wireless security
Secure time synchronization service for sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Delay of intrusion detection in wireless sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Integrity regions: authentication through presence in wireless networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Modelling adversaries and security objectives for routing protocols in wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Channel surfing: defending wireless sensor networks from jamming and interference
Proceedings of the 4th international conference on Embedded networked sensor systems
Wormhole-Based Antijamming Techniques in Sensor Networks
IEEE Transactions on Mobile Computing
Channel surfing: defending wireless sensor networks from interference
Proceedings of the 6th international conference on Information processing in sensor networks
Dependability in Wireless Networks: Can We Rely on WiFi?
IEEE Security and Privacy
Cross-layer jamming detection and mitigation in wireless broadcast networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Towards characterizing the effectiveness of random mobility against actuation attacks
Computer Communications
CHEMAS: Identify suspect nodes in selective forwarding attacks
Journal of Parallel and Distributed Computing
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Managing the Mobility of a Mobile Sensor Network Using Network Dynamics
IEEE Transactions on Parallel and Distributed Systems
Anti-jamming timing channels for wireless networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Modelling and analysis of bandwidth competition in 802.11 wireless networks
International Journal of Mobile Network Design and Innovation
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
Computer Standards & Interfaces
Secure Time Synchronization in Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Defending wireless sensor networks from radio interference through channel adaptation
ACM Transactions on Sensor Networks (TOSN)
A jamming-resistant MAC protocol for single-hop wireless networks
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
Jamming detection mechanisms for wireless sensor networks
Proceedings of the 3rd international conference on Scalable information systems
A cross-layer dropping attack in video streaming over ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive?
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
ACM Transactions on Sensor Networks (TOSN)
A coding-theoretic approach for efficient message verification over insecure channels
Proceedings of the second ACM conference on Wireless network security
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
Proceedings of the second ACM conference on Wireless network security
JAID: An algorithm for data fusion and jamming avoidance on distributed sensor networks
Pervasive and Mobile Computing
Efficient uncoordinated FHSS anti-jamming communication
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 2nd ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
Tradeoffs between jamming resilience and communication efficiency in key establishment
ACM SIGMOBILE Mobile Computing and Communications Review
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Transient-based identification of wireless sensor nodes
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Anti-jamming for embedded wireless networks
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
ARES: an anti-jamming reinforcement system for 802.11 networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
XLSEC: a distributed cross-layer framework for security in wireless sensor networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Jammer localization in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Zeroing-in on network metric minima for sink location determination
Proceedings of the third ACM conference on Wireless network security
Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks
Computers and Electrical Engineering
Lightweight jammer localization in wireless networks: system design and implementation
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Performance sensitivities of wireless mesh networks under path-based DoS attacks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Detection of radio interference attacks in VANET
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Ensemble: cooperative proximity-based authentication
Proceedings of the 8th international conference on Mobile systems, applications, and services
Detecting and mitigating the impact of wideband jammers in IEEE 802.11 WLANs
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Detection of jamming attacks in wireless ad hoc networks using error distribution
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Random-walk based approach to detect clone attacks in wireless sensor networks
IEEE Journal on Selected Areas in Communications
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
IEEE Journal on Selected Areas in Communications
Detection of reactive jamming in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Randomized differential DSSS: jamming-resistant wireless broadcast communication
INFOCOM'10 Proceedings of the 29th conference on Information communications
On order gain of backoff misbehaving nodes in CSMA/CA-based wireless networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
An Experimental Study of the Performance Impact of Path-Based DoS Attacks in Wireless Mesh Networks
Mobile Networks and Applications
Jamming-resistant broadcast communication without shared keys
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Distributed jammer network: impact and characterization
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Energy-efficient jamming attack in IEEE 802.11 MAC
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
A novel approach to identify insider-based jamming attacks in multi-channel wireless networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
JENNA: a jamming evasive network-coding neighbor-discovery algorithm for cognitive radio networks
IEEE Wireless Communications
A jamming-resistant MAC protocol for multi-hop wireless networks
DISC'10 Proceedings of the 24th international conference on Distributed computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
A cross-layer approach to detect jamming attacks in wireless ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Detecting selective forwarding attacks in wireless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
Proceedings of the 26th Annual Computer Security Applications Conference
Assessing the vulnerability of replicated network services
Proceedings of the 6th International COnference
On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks
IEEE Transactions on Wireless Communications
Spatio-temporal techniques for anti-jamming in embedded wireless networks
EURASIP Journal on Wireless Communications and Networking
DoS attacks exploiting signaling in UMTS and IMS
Computer Communications
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Journal of Network and Computer Applications
Compromise-resilient anti-jamming for wireless sensor networks
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Vulnerabilities of wireless key exchange based on channel reciprocity
WISA'10 Proceedings of the 11th international conference on Information security applications
Transmit power estimation using spatially diverse measurements under wireless fading
IEEE/ACM Transactions on Networking (TON)
Cross-layer jamming detection and mitigation in wireless broadcast networks
IEEE/ACM Transactions on Networking (TON)
Computers and Electrical Engineering
International Journal of Sensor Networks
Conflict on a communication channel
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Short paper: reactive jamming in wireless networks: how realistic is the threat?
Proceedings of the fourth ACM conference on Wireless network security
Short paper: security evaluation of IEEE 802.11w specification
Proceedings of the fourth ACM conference on Wireless network security
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
CrowdLoc: wireless jammer localization with crowdsourcing measurements
Proceedings of the 2nd international workshop on Ubiquitous crowdsouring
Jamming attack in WSN: a spatial perspective
Proceedings of the 13th international conference on Ubiquitous computing
Investigation of signal and message manipulations on the wireless channel
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
A measurement-driven anti-jamming system for 802.11 networks
IEEE/ACM Transactions on Networking (TON)
Launching denial-of-service jamming attacks in underwater sensor networks
Proceedings of the Sixth ACM International Workshop on Underwater Networks
EM-MAC: a dynamic multichannel energy-efficient MAC protocol for wireless sensor networks
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
Adversarial behavior in network mechanism design
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Anomaly-Based intrusion detection algorithms for wireless networks
WWIC'10 Proceedings of the 8th international conference on Wired/Wireless Internet Communications
Wireless jamming localization by exploiting nodes’ hearing ranges
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Remote Detection of a Frequency Jammer Operating in the Down Link of a Cellular System
Wireless Personal Communications: An International Journal
Security measures in wired and wireless networks
ISIICT'09 Proceedings of the Third international conference on Innovation and Information and Communication Technology
Enforcing dynamic spectrum access with spectrum permits
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
A cross-layer game for energy-efficient jamming detection in ad hoc networks
Security and Communication Networks
In VANETs we trust?: characterizing RF jamming in vehicular networks
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications
Mobile Networks and Applications
Toward a safe integrated clinical environment: a communication security perspective
Proceedings of the 2012 ACM workshop on Medical communication systems
Evaluating resistance to jamming and casual interception in mobile wireless networks
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Defending against jamming attacks in wireless local area networks
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
International Journal of Information Security and Privacy
Survey Cyber security in the Smart Grid: Survey and challenges
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the impact of jamming attacks on cooperative spectrum sensing in cognitive radio networks
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
Detection of reactive jamming in DSSS-based wireless networks
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Secure localization and location verification in wireless sensor networks: a survey
The Journal of Supercomputing
Proceedings of the Tenth Workshop on Visualization for Cyber Security
Performance of IEEE 802.11 under Jamming
Mobile Networks and Applications
Analysis and Evaluation of Jammer Interference in LTE
Proceedings of the Second International Conference on Innovative Computing and Cloud Computing
Joint reactive jammer detection and localization in an enterprise WiFi network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mitigating jamming attacks in wireless broadcast systems
Wireless Networks
Ad Hoc Networks
Privacy Provisioning in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitting radio frequency signals that do not follow an underlying MAC protocol. Jamming attacks can severely interfere with the normal operation of wireless networks and, consequently, mechanisms are needed that can cope with jamming attacks. In this paper, we examine radio interference attacks from both sides of the issue: first, we study the problem of conducting radio interference attacks on wireless networks, and second we examine the critical issue of diagnosing the presence of jamming attacks. Specifically, we propose four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluate their effectiveness in terms of how each method affects the ability of a wireless node to send and receive packets. We then discuss different measurements that serve as the basis for detecting a jamming attack, and explore scenarios where each measurement by itself is not enough to reliably classify the presence of a jamming attack. In particular, we observe that signal strength and carrier sensing time are unable to conclusively detect the presence of a jammer. Further, we observe that although by using packet delivery ratio we may differentiate between congested and jammed scenarios, we are nonetheless unable to conclude whether poor link utility is due to jamming or the mobility of nodes. The fact that no single measurement is sufficient for reliably classifying the presence of a jammer is an important observation, and necessitates the development of enhanced detection schemes that can remove ambiguity when detecting a jammer. To address this need, we propose two enhanced detection protocols that employ consistency checking. The first scheme employs signal strength measurements as a reactive consistency check for poor packet delivery ratios, while the second scheme employs location information to serve as the consistency check. Throughout our discussions, we examine the feasibility and effectiveness of jamming attacks and detection schemes using the MICA2 Mote platform.