2014 IEEE Conference on Communications and Network Security 2014
DOI: 10.1109/cns.2014.6997460
|View full text |Cite
|
Sign up to set email alerts
|

Moving-target defense mechanisms against source-selective jamming attacks in tactical cognitive radio MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…To defend against side-channel attacks, Azab and Eltoweissy [32] migrated cloud tenants' applications between different hosts. To defend against jamming attacks, Marttinen et al [33] adopted an approach in which the source MAC address depends on the frame destination and only the receiver knows how to encode the source address. Regarding buffer overflow attacks, Boyd et al [20] prevented code-injection attacks by randomizing the underlying system's instructions, causing the foreign code to fail to execute correctly.…”
Section: A Mtd Technologymentioning
confidence: 99%
“…To defend against side-channel attacks, Azab and Eltoweissy [32] migrated cloud tenants' applications between different hosts. To defend against jamming attacks, Marttinen et al [33] adopted an approach in which the source MAC address depends on the frame destination and only the receiver knows how to encode the source address. Regarding buffer overflow attacks, Boyd et al [20] prevented code-injection attacks by randomizing the underlying system's instructions, causing the foreign code to fail to execute correctly.…”
Section: A Mtd Technologymentioning
confidence: 99%
“…A scheme for the routing protocol AODV is proposed to detect and remove Gray Hole and Black Hole Attacks [8]. In this scheme, the intermediate node detects the malicious node sending false routing information by calculating a PEAK value, where the PEAK value is the maximum possible value of the sequence number that any RREP can have in the current state [9].…”
Section: Introductionmentioning
confidence: 99%
“…The second reconfiguration is to be applied at the physical layer by changing the node's firmware. In [6], the authors use MTD to defend against selective jamming attacks. This work studies the problem of isolating a subset of the network by jamming the signals sent from this sub-network.…”
Section: Introductionmentioning
confidence: 99%
“…This work studies the problem of isolating a subset of the network by jamming the signals sent from this sub-network. The work in [6] also provides practical MTD solutions such as address flipping and random address assignment. The use of software defined networking in applying MTD was discussed in [7].…”
Section: Introductionmentioning
confidence: 99%