Optimal Jamming Attack Scheduling of Interactive Channels
نویسندگان
چکیده
منابع مشابه
Feasibility of Channel Hopping in Jamming Attack
Currently deployed WLAN network use cooperative spectrum sharing and is prone to jamming based denial of service attack. In this article we propose a model to avoid jamming that use decentralized channel hopping algorithm. Upon detection of jamming, the network switches its channel of operation in accordance with pseudo-random sequence based rendezvous. We develop a testbed to evaluate the feas...
متن کاملOptimal Denial-of-Service Attack Scheduling in Cyber-Physical Systems∗
Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some attacking patterns. In this paper, we investigate how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance. Specifically, we consider the scenario where a sensor sends its data to a remote ...
متن کاملJamming attack in MANET: A Selected Review
--A MANET is a collection of nodes that do not rely on a predefined infrastructure to keep the network connected Wireless sensor networks are being used in many applications like health monitoring, military purposes, and home automation. These networks are equipped with large number of sensors, which are spatially distributed. Wireless sensor networks are widely used in remote areas, defense an...
متن کاملCapacity and optimal collusion attack channels for Gaussian fingerprinting games
In content fingerprinting, the same media covertext—image, video, audio, or text—is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to “remove” their fingerprints and forge a pirated copy. To trace the forgery back to members of the coali...
متن کاملActivity Modelling and Countermeasures on Jamming Attack
In last few decades, there has been a wide demand of wireless sensor networks (WSNs) in extensive mission critical applications such as monitoring, industrial control, military, health and many more. The larger demand of WSN in mission critical applications makes it more prone towards malicious users who are trying to invade. These security assaults worsen the performance of WSN in large extent...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2995939