Swarm-based intelligent technique to prevent selective jamming attacks for dynamic topology
نویسندگان
چکیده
منابع مشابه
Data Encapsulation To Prevent Jamming Attacks In Wireless Networks
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of p...
متن کاملPacket-Hiding Methods for Preventing Selective Jamming Attacks
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of p...
متن کاملAnalysis of Swarm Intelligent Based Defense Algorithm for Detecting Jamming Attack in Wireless Sensor Networks (WSNS)
Wireless Sensor Networks (WSNs) are one of the most widely used technologies in our daily lives. However, since wireless sensor networks are based on communication within radio channels, WSNs are susceptible to malicious attempts to block the channel. One of the most frequently used attacks is a jamming attack. This type of attack not only blocks the ongoing communication but also exhaust the e...
متن کاملA Lightweight Technique to Prevent Wormhole Attacks in AODV
Mobile ad hoc network (MANET) is vulnerable to many types of routing attacks due to its dynamic topology and the collaboration of MANET nodes in finding routing paths. The wormhole attack is considered one of the most threatening attacks. The most popular MANET routing protocols such as ad hoc on demand distance victor (AODV) are vulnerable to this security threat. In this paper, a lightweight ...
متن کاملIntelligent Jamming Attacks, Counterattacks and (Counter)2 Attacks in 802.11b Wireless Networks
It has been shown that reservation based MAC protocols such as 802.11b DCF are susceptible to Intelligent Jamming wherein a protocol aware jammer can bring down the network throughput essentially to zero by using very limited energy, see [1]. We propose and analyze intelligent jamming techniques based on “misbehaving” MAC level access timings. An additional intelligent jamming technique based o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2014
ISSN: 2278-1021
DOI: 10.17148/ijarcce.2014.31211