2019
DOI: 10.1109/lwc.2019.2924426
|View full text |Cite
|
Sign up to set email alerts
|

Covert Jamming Using Fake ACK Frame Injection on IEEE 802.11 Wireless LANs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…The network architecture is divided into three layers: data source, multihoming network, and terminal processor. Among them, the data source stores compensation management data, the multihoming network includes 4G or 5G network [17], LAN [18], IPv4, and IPv6 [19], and the terminal processor can be PC, smartphone, or tablet computer [20]. The advantage of multihoming network architecture is that when one of the network links is disconnected, the end users can still get the data source through other host networks, which will not affect the development of compensation management.…”
Section: Multihoming Network Architecturementioning
confidence: 99%
“…The network architecture is divided into three layers: data source, multihoming network, and terminal processor. Among them, the data source stores compensation management data, the multihoming network includes 4G or 5G network [17], LAN [18], IPv4, and IPv6 [19], and the terminal processor can be PC, smartphone, or tablet computer [20]. The advantage of multihoming network architecture is that when one of the network links is disconnected, the end users can still get the data source through other host networks, which will not affect the development of compensation management.…”
Section: Multihoming Network Architecturementioning
confidence: 99%
“…Thus, considering the monitoring system needs packets to transmit from the source node via multiple hops to the destinations, we can model the overhead transmission line monitoring communication system by string‐topology multi‐hop network. IEEE 802.11 standards is one of the most widely applied protocols in wireless network [7–9]. In this paper, we studied the IEEE 802.11 string‐topology multi‐hop network performance of the overhead transmission line monitoring system.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, considering the monitoring system needs packets to transmit from the source node via multiple hops to the destinations, we can model the overhead transmission line monitoring communication system by string-topology multi-hop network. IEEE 802.11 standards is one of the most widely applied protocols in wireless network [7][8][9]. In this paper, we studied the This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.…”
mentioning
confidence: 99%
“…In recent years, researchers have investigated covert communication in various wireless communication scenarios such as IoT applications [17,18], unmanned aerial vehicle (UAV) networks [19,20], cooperative relaying networks [21]- [23], device-to-device (D2D) communications in 5G [24], and IEEE 802.11 Wi-Fi networks [25]. In [20], covert communication was considered in the presence of a UAV with location uncertainty of terrestrial nodes.…”
mentioning
confidence: 99%
“…Greedy relaying was investigated in [22] in which the relay opportunistically transmits its own information to the destination covertly besides retransmitting the source's message. In [25], a covert jamming attack was investigated which is an insetting attack in IEEE 802.11 wireless LANs. The aim of this attack is to destroy the data and defraud the transmitter by injecting a covert jamming signal [25].…”
mentioning
confidence: 99%