CFP last date
20 May 2024
Reseach Article

Study on Jammers and Defense Strategies in Wireless Networks

by E. Sasikala, N. Rengarajan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 2
Year of Publication: 2013
Authors: E. Sasikala, N. Rengarajan
10.5120/10052-4639

E. Sasikala, N. Rengarajan . Study on Jammers and Defense Strategies in Wireless Networks. International Journal of Computer Applications. 62, 2 ( January 2013), 21-23. DOI=10.5120/10052-4639

@article{ 10.5120/10052-4639,
author = { E. Sasikala, N. Rengarajan },
title = { Study on Jammers and Defense Strategies in Wireless Networks },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 2 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number2/10052-4639/ },
doi = { 10.5120/10052-4639 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:10:36.142071+05:30
%A E. Sasikala
%A N. Rengarajan
%T Study on Jammers and Defense Strategies in Wireless Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 2
%P 21-23
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless networks overcame the limitations of the traditional approaches in the implementation of the wired networks. The number of nodes can be easily extended and provided with then the services of the networks. Amenities of the private networks are risked by the invaders and their activities to disclose the confidential contents. These invaders established a standard mode of attacking by jamming the services upon described functions. The jammers would key in attack packets to the networks claiming to be a reasonable request to block the services of the intended users. Ultimately, the network would continue answering the meaningless queries of the attackers thereby avoiding or making the users to wait indefinitely. Increase in the attacks would degrade the services and standards of the wireless networks. Denial of Service (DoS) attacks involves mechanisms to flood the medium of data transfer with futile packets, or to alter the contents of the significant information of the packets. Denial of Service attacks has extended their area of attacks to pretense their identity and revises the contents of the message packets to pose a threat to the networks. Mechanisms that have been proposed to detect and mitigate the effects of those jammers are examined in this study.

References
  1. C. Schleher, Electronic Warfare in the Information Age. Artech House,1999.
  2. R. Mallik, R. Scholtz, and G. Papavassilopoulos, "Analysis of an on-off jamming situation as a dynamic game," IEEE Trans. Commun. , vol. 48,no. 8, pp. 1360-1373, Aug. 2000.
  3. D. Wood and J. A. Stankovic, "Denial of service in sensor networks,"IEEE Comput. , vol. 35, no. 10, pp. 54-62, 2002.
  4. R. Negi and A. Perrig, "Jamming analysis of MAC protocols," Carnegie Mellon technical memo, 2003.
  5. J. Bellardo and S. Savage, "802. 11 denial-of-service attacks: real vulnerabilities and practical solutions," in Proc. USENIX Security Symp. , pp. 15-28, 2003.
  6. Wood, J. Stankovic, and S. Son. "JAM: a jammed-area mapping service for sensor networks," in Proc. IEEE Real-Time Syst. Symp. , pp. 286-297, 2003.
  7. G. Noubir and G. Lin, "Low-power DoS attacks in data wireless LANs and countermeasures," SIGMOBILE Mob. Comput. Commun. Rev. , vol. 7, no. 3, pp. 29-30, 2003.
  8. J. M. McCune, E. Shi, A. Perrig, andM. K. Reiter, "Detection of denialof-message attacks on sensor network broadcasts," in Proc. IEEE Symp. Security Privacy, 2005.
  9. W. Xu et al. , "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. ACM Int'l. Symp. Mobile Ad Hoc Netw. Comput. , 2005, pp. 46-57.
  10. M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless networks," in Proc IEEE INFOCOM, May 2007.
  11. Q. Huang, H. Kobayashi, and B. Liu. "Modeling of distributed denialof service attacks in wireless networks," in IEEE Pacific Rim Conf. Commun. , Computers and Signal Process. , vol. 1, pp. 113-127, 2003
  12. L. Sherriff, "Virus launches DDoS for mobile phones," [Online]. Available: http://www. theregister. co. uk/content/l/12394. html
  13. M. Acharya and D. Thuente, "Intelligent jamming attacks, counterattacks and (counter)2 attacks in 802. 11b wireless networks," in Proc. OPNETWORK-2005 Conf. , Washington DC, USA, Aug. 2005.
  14. Y. Zhang, W. Lee, and Y. -A. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," in ACM J. Wireless Net. , vol. 9, no. 5, Sept. 2003, pp. 545-56.
  15. A. B. Smith, "An examination of an intrusion detection architecture for wireless ad hoc networks," in 5th National. Colloq. Inf. Syst. Sec. Education, May 2001.
  16. O. Kachirski and R. Guha, "Intrusion detection using mobile agents inwireless ad hoc networks," in Knowledge Media Net. , Proc. IEEE Wksp. ,July 10-12, 2002, pp. 153-58.
  17. W. Xu et al, "Channel surfing and spatial retreats: Defenses against wireless denial of service," in Proc. 2004 ACM Wksp. Wireless Security,2004, pp. 80-89.
  18. V. Navda, A. Bohra, S. Ganguly, and D. Rubenstein, "Using channel hopping to increase 802. 11 resilience to jamming attacks," in IEEE iNFOCOM, Mini-Conf. , 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Jamming detection mechanisms wireless networks network security