2011
DOI: 10.1109/surv.2011.041110.00022
|View full text |Cite
|
Sign up to set email alerts
|

Denial of Service Attacks in Wireless Networks: The Case of Jammers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
375
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 568 publications
(377 citation statements)
references
References 37 publications
2
375
0
Order By: Relevance
“…Passive attacks typically involve only eavesdropping of data while active attacks could range from deleting messages, injecting erroneous messages, impersonate a node, etc thus violating the security requirements like availability, integrity, authentication and non-repudiation [3]. In this work, a solution for defending an important attack on Transmission Control Protocol (TCP), namely session hijacking attack in MANET.…”
Section: A Attacks In Manetmentioning
confidence: 99%
“…Passive attacks typically involve only eavesdropping of data while active attacks could range from deleting messages, injecting erroneous messages, impersonate a node, etc thus violating the security requirements like availability, integrity, authentication and non-repudiation [3]. In this work, a solution for defending an important attack on Transmission Control Protocol (TCP), namely session hijacking attack in MANET.…”
Section: A Attacks In Manetmentioning
confidence: 99%
“…This intentional interference with wireless mediums can be used to introduce the Denial of Service (DoS) attacks on wireless networks. Typically, jamming has been addressed under an external threat model (Pelechrinis et al, 2011). The open nature of the wireless networks, it has multiple security threats.…”
Section: Jcsmentioning
confidence: 99%
“…There are many jamming techniques that vary from simple methods of jamming such as a continuous transmission of interference signals to block communication, to advanced methods which exploit protocol vulnerabilities of victim(s). In [112], a comprehensive survey is presented to cover various jamming attacks and methods of defense. In Table 9, jamming models discussed in [112] are mentioned with relevant information and specified references.…”
Section: Defense Against Ddos Attacks In Wsns and Manetsmentioning
confidence: 99%
“…In [112], a comprehensive survey is presented to cover various jamming attacks and methods of defense. In Table 9, jamming models discussed in [112] are mentioned with relevant information and specified references.…”
Section: Defense Against Ddos Attacks In Wsns and Manetsmentioning
confidence: 99%
See 1 more Smart Citation