S Biswas, J Mišić, V Mišić - 2012 IEEE Global Communications …, 2012 - ieeexplore.ieee.org
A VANET that uses IEEE 802.11 p EDCA mechanism is susceptible to a synchronization- based DDoS attack due to periodicity of transmissions and small contention window sizes …
Network communication using unprotected air as a medium leads to unique challenges ensuring confidentiality, integrity and availability. While newer amendments of IEEE 802.11 …
We present intrusion detection algorithms to detect physical layer jamming attacks in wireless networks. We compare the performance of local algorithms on the basis of the …
AK Malhi, S Batra - Security and Communication Networks, 2016 - Wiley Online Library
Inter‐vehicular communication needs to be secure and anonymous as the effective and robust operations including security and privacy are critical for the deployment of vehicular …
The proliferation of wireless networks has been remarkable during the last decade. The license-free nature of the ISM band along with the rapid proliferation of the Wi-Fi-enabled …
J Soryal, T Saadawi - 2013 International Conference on …, 2013 - ieeexplore.ieee.org
The paper presents a light weight technique to detect the Denial of Service (DoS) behavior applied by malicious users in Internet-connected vehicles using Wi-Fi to access the Internet …
Wireless multihop networks such as ad hoc and mesh networks consist of wireless nodes without any fixed base stations or a backbone infrastructure. Such networks are …
RD Pietro, G Oligeri - ACM Transactions on Information and System …, 2015 - dl.acm.org
Jamming techniques require only moderate resources to be deployed, while their effectiveness in disrupting communications is unprecedented. In this article, we introduce …
In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting physical layer jamming attacks in wireless networks, by seeking changes in the …