Real-time jamming detection in wireless IoT networks

FT Zahra, YS Bostanci, M Soyturk - IEEe Access, 2023 - ieeexplore.ieee.org
IoT-based networks are vulnerable to jamming attacks due to their large-scale deployment
and shared communication environment. Resource constraints and the low computational …

DDoS attack on WAVE-enabled VANET through synchronization

S Biswas, J Mišić, V Mišić - 2012 IEEE Global Communications …, 2012 - ieeexplore.ieee.org
A VANET that uses IEEE 802.11 p EDCA mechanism is susceptible to a synchronization-
based DDoS attack due to periodicity of transmissions and small contention window sizes …

Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard

B Könings, F Schaub, F Kargl… - 2009 IEEE 34th …, 2009 - ieeexplore.ieee.org
Network communication using unprotected air as a medium leads to unique challenges
ensuring confidentiality, integrity and availability. While newer amendments of IEEE 802.11 …

Anomaly‐based intrusion detection of jamming attacks, local versus collaborative detection

AG Fragkiadakis, VA Siris… - Wireless …, 2015 - Wiley Online Library
We present intrusion detection algorithms to detect physical layer jamming attacks in
wireless networks. We compare the performance of local algorithms on the basis of the …

Genetic‐based framework for prevention of masquerade and DDoS attacks in vehicular ad‐hocnetworks

AK Malhi, S Batra - Security and Communication Networks, 2016 - Wiley Online Library
Inter‐vehicular communication needs to be secure and anonymous as the effective and
robust operations including security and privacy are critical for the deployment of vehicular …

Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype

AG Fragkiadakis, EZ Tragos, T Tryfonas… - EURASIP Journal on …, 2012 - Springer
The proliferation of wireless networks has been remarkable during the last decade. The
license-free nature of the ISM band along with the rapid proliferation of the Wi-Fi-enabled …

DoS attack detection in Internet-connected vehicles

J Soryal, T Saadawi - 2013 International Conference on …, 2013 - ieeexplore.ieee.org
The paper presents a light weight technique to detect the Denial of Service (DoS) behavior
applied by malicious users in Internet-connected vehicles using Wi-Fi to access the Internet …

[图书][B] Redundancy-based Approaches in Wireless Multihop Network Design

T Biswas - 2014 - search.proquest.com
Wireless multihop networks such as ad hoc and mesh networks consist of wireless nodes
without any fixed base stations or a backbone infrastructure. Such networks are …

Silence is golden: Exploiting jamming and radio silence to communicate

RD Pietro, G Oligeri - ACM Transactions on Information and System …, 2015 - dl.acm.org
Jamming techniques require only moderate resources to be deployed, while their
effectiveness in disrupting communications is unprecedented. In this article, we introduce …

Anomaly-based intrusion detection algorithms for wireless networks

AG Fragkiadakis, VA Siris, N Petroulakis - International Conference on …, 2010 - Springer
In this paper we present and evaluate anomaly-based intrusion detection algorithms for
detecting physical layer jamming attacks in wireless networks, by seeking changes in the …