Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
IEEE Communications surveys and tutorials, 2011-01, Vol.13 (2), p.245-257
2011

Details

Autor(en) / Beteiligte
Titel
Denial of Service Attacks in Wireless Networks: The Case of Jammers
Ist Teil von
  • IEEE Communications surveys and tutorials, 2011-01, Vol.13 (2), p.245-257
Ort / Verlag
New York: IEEE
Erscheinungsjahr
2011
Link zum Volltext
Quelle
IEEE/IET Electronic Library (IEL)
Beschreibungen/Notizen
  • The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such attacks can be very easily accomplished using off-the-shelf equipment. To give a simple example, a malicious node can continually transmit a radio signal in order to block any legitimate access to the medium and/or interfere with reception. This act is called jamming and the malicious nodes are referred to as jammers. Jamming techniques vary from simple ones based on the continual transmission of interference signals, to more sophisticated attacks that aim at exploiting vulnerabilities of the particular protocol used. In this survey, we present a detailed up-to-date discussion on the jamming attacks recorded in the literature. We also describe various techniques proposed for detecting the presence of jammers. Finally, we survey numerous mechanisms which attempt to protect the network from jamming attacks. We conclude with a summary and by suggesting future directions.
Sprache
Englisch
Identifikatoren
ISSN: 1553-877X
eISSN: 1553-877X
DOI: 10.1109/SURV.2011.041110.00022
Titel-ID: cdi_crossref_primary_10_1109_SURV_2011_041110_00022

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX