Corpus ID: 16774109

Improving Reliability of Jamming Attack Detection in Ad hoc Networks

  title={Improving Reliability of Jamming Attack Detection in Ad hoc Networks},
  author={G. Thamilarasu and S. Mishra and R. Sridhar},
  journal={Int. J. Commun. Networks Inf. Secur.},
  • G. Thamilarasu, S. Mishra, R. Sridhar
  • Published 2011
  • Computer Science
  • Int. J. Commun. Networks Inf. Secur.
  • Defense against denial of service (DoS) attacks is a critical component of any security system as these attacks can affect the availability of a node or an entire network. In this work, we focus on jamming type DoS attacks at the physical a nd MAC layers in 802.11 based ad hoc networks. Collisions in wirel ess networks occur due to varying factors such as jamming attack s, hidden terminal interferences and network congestion. We p resent a probabilistic analysis to show that collision occur… CONTINUE READING
    27 Citations

    Figures and Topics from this paper

    Explore Further: Topics Discussed in This Paper

    Detection of Jamming Attacks in Mobile Ad Hoc Network
    Effect of Jamming Attack in Mobile Ad Hoc Environment
    • 2
    Jamming attack in MANET: A Selected Review
    • 3
    • Highly Influenced
    DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks
    • 52
    • PDF
    Detection of Network Congestion and Denial of Service (DoS) Attacks in Cognitive Radio Networks
    • Ejike Chuku, D. Kouvatsos
    • Computer Science
    • 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)
    • 2019
    A novel framework for jamming detection and classification in wireless networks
    • A. Y. Dak, N. Khalid, S. Yahya
    • Engineering, Computer Science
    • 2012 8th International Conference on Computing and Networking Technology (INC, ICCIS and ICMIC)
    • 2012
    • 7
    Using cross-layer design to detect jamming attacks in the CoNSIS scenario
    Integrated combined layer algorithm (ICLA) for Jamming detection in MANET
    • 1


    Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution
    • 76
    • PDF
    The feasibility of launching and detecting jamming attacks in wireless networks
    • 1,238
    • Highly Influential
    • PDF
    Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
    • 123
    • PDF
    Intelligent jamming in wireless networks with applications to 802.11b and other networks
    • 191
    • PDF
    Low-power DoS attacks in data wireless LANs and countermeasures
    • 218
    • PDF
    DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks
    • A. Wood, J. Stankovic, G. Zhou
    • Computer Science
    • 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
    • 2007
    • 273
    • PDF
    Wormhole-Based Anti-Jamming Techniques in Sensor Networks
    • 163
    • PDF
    SPREAD: Foiling Smart Jammers Using Multi-Layer Agility
    • 109
    • PDF
    Toward a cross-layer monitoring process for mobile ad hoc networks
    • 28
    • PDF
    Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
    • J. Chiang, Y. Hu
    • Computer Science
    • IEEE/ACM Transactions on Networking
    • 2011
    • 130
    • PDF