Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …

Performance of IEEE 802.11 under jamming

E Bayraktaroglu, C King, X Liu, G Noubir… - Mobile Networks and …, 2013 - Springer
We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that
covers both channel-oblivious and channel-aware jamming. We consider two channel …

[PDF][PDF] Intelligent jamming in wireless networks with applications to 802.11 b and other networks

D Thuente, M Acharya - Proc. of MILCOM, 2006 - Citeseer
It has long been recognized that complete jamming of wireless networks can be realized by
generating continuous noise with sufficient power in the vicinity of the wireless network …

Jamming ACK attack to wireless networks and a mitigation approach

Z Zhang, J Wu, J Deng, M Qiu - IEEE GLOBECOM 2008-2008 …, 2008 - ieeexplore.ieee.org
In many medium access control (MAC) schemes for wireless networks, an Acknowledgment
(ACK) packet is transmitted from the data receiver to the data sender to announce the …

Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks

AL Toledo, X Wang - IEEE Transactions on Information …, 2008 - ieeexplore.ieee.org
Carrier-sensing multiple-access with collision avoidance (CSMA/CA)-based networks, such
as those using the IEEE 802.11 distributed coordination function protocol, have experienced …

Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard

B Könings, F Schaub, F Kargl… - 2009 IEEE 34th …, 2009 - ieeexplore.ieee.org
Network communication using unprotected air as a medium leads to unique challenges
ensuring confidentiality, integrity and availability. While newer amendments of IEEE 802.11 …

[PDF][PDF] Intelligent jamming attacks, counterattacks and (counter) 2 attacks in 802.11 b wireless networks

M Acharya, D Thuente - Proceedings of the OPNETWORK-2005 …, 2005 - Citeseer
It has been shown that reservation based MAC protocols such as 802.11 b DCF are
susceptible to Intelligent Jamming wherein a protocol aware jammer can bring down the …

[PDF][PDF] Future 5g mobile broadband networks using cloud-based services with advanced security and qos framework

M Bogdanoski, T Shuminoski… - Acta Polytechnica …, 2020 - researchgate.net
The work suggests a potential solution to contemporary Corporate and National security
concerns, with regards to the use in the future of 5G technologies. In today's digital age …

Denial of service attacks on inter-vehicle communication networks

JJ Blum, A Neiswender… - 2008 11th International …, 2008 - ieeexplore.ieee.org
Future safety systems will rely on the transmission of vehicle positions and kinematics
through direct vehicle-to-vehicle wireless communication. The wireless access in vehicular …

Security comparison of wired and wireless network with firewall and virtual private network (VPN)

YP Kosta, UD Dalal, RK Jha - 2010 International Conference …, 2010 - ieeexplore.ieee.org
Computer networks are typically a shared resource used by many applications for many
different purposes. Sometimes the data transmitted between application processes is …