CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Survey on Preventing Jamming Attacks in Wireless Communication

by R. Saranyadevi, M. Shobana, D. Prabakar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 23
Year of Publication: 2012
Authors: R. Saranyadevi, M. Shobana, D. Prabakar
10.5120/9435-3493

R. Saranyadevi, M. Shobana, D. Prabakar . A Survey on Preventing Jamming Attacks in Wireless Communication. International Journal of Computer Applications. 57, 23 ( November 2012), 1-3. DOI=10.5120/9435-3493

@article{ 10.5120/9435-3493,
author = { R. Saranyadevi, M. Shobana, D. Prabakar },
title = { A Survey on Preventing Jamming Attacks in Wireless Communication },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 23 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number23/9435-3493/ },
doi = { 10.5120/9435-3493 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:01:11.233770+05:30
%A R. Saranyadevi
%A M. Shobana
%A D. Prabakar
%T A Survey on Preventing Jamming Attacks in Wireless Communication
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 23
%P 1-3
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Communication in wireless network is possible with an air medium. Due to the high security threats in this system, the network may face various difficulties. One of the major threat is jamming attack which comes under Denial Of Service (DOS) attack. Jamming attack is common among many exploits that compromises the wireless environment. The work of authorized users is by denying service to as legitimate traffic is jammed by the overwhelming frequencies of illegitimate traffic. In order to mitigate the impact of jamming, three techniques are being used: (a) how to thwart jamming in control channel (b) An Anti-jamming broadcast communication using Uncoordinated Spread Spectrum (USS) technique (c) Mitigating jamming impact in timing channel. We analyse these methods for reducing jamming inside a network.

References
  1. X. Zhang and L. Jacob, "Multicast Zone Routing Protocol in Mobile Ad Hoc Wireless Networks," Proc. Local Computer Networks (LCN '03), Oct. 2003.
  2. X. Xiang and X. Wang, "An Efficient Geographic Multicast Protocol for Mobile Ad Hoc Networks,"Proc. IEEE Int'l Symp. World of Wireless,Mobile and Multimedia Networks (WoWMoM),June 2006.
  3. X. Xiang, Z. Zhou, and X. Wang, "Self-Adaptive On Demand Geographic Routing Protocols for Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, May 2007.
  4. X. Xiang, X. Wang, and Y. Yang. Supporting efficient and scalable multicasting over mobile adhoc networks, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 4, April 2011.
  5. Kaan Bur, Cem Erosy, "Ad Hoc quality of service multicast routings", Computer communications, Vol. 29, 2005, pp. 136-148.
  6. Hui Cheng a, Jiannong Cao, Xingwei Wang, "A fast and efficient multicast algorithm for QoS group communications in heterogeneous network", Computer communications, Elsevier, Vol. 30, 2007 pp. 2225-2235.
  7. Khalid A. Farhan, "Network sender multicast routing protocol", Proceedings of seventh IEEE International conference on networking, 2008, pp. 60-65.
Index Terms

Computer Science
Information Sciences

Keywords

Jamming attacks Spread spectrum Control channel Timing channel