Swarm-based intelligent technique to prevent selective jamming attacks for dynamic topology

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Encapsulation To Prevent Jamming Attacks In Wireless Networks

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of p...

متن کامل

Packet-Hiding Methods for Preventing Selective Jamming Attacks

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of p...

متن کامل

Analysis of Swarm Intelligent Based Defense Algorithm for Detecting Jamming Attack in Wireless Sensor Networks (WSNS)

Wireless Sensor Networks (WSNs) are one of the most widely used technologies in our daily lives. However, since wireless sensor networks are based on communication within radio channels, WSNs are susceptible to malicious attempts to block the channel. One of the most frequently used attacks is a jamming attack. This type of attack not only blocks the ongoing communication but also exhaust the e...

متن کامل

A Lightweight Technique to Prevent Wormhole Attacks in AODV

Mobile ad hoc network (MANET) is vulnerable to many types of routing attacks due to its dynamic topology and the collaboration of MANET nodes in finding routing paths. The wormhole attack is considered one of the most threatening attacks. The most popular MANET routing protocols such as ad hoc on demand distance victor (AODV) are vulnerable to this security threat. In this paper, a lightweight ...

متن کامل

Intelligent Jamming Attacks, Counterattacks and (Counter)2 Attacks in 802.11b Wireless Networks

It has been shown that reservation based MAC protocols such as 802.11b DCF are susceptible to Intelligent Jamming wherein a protocol aware jammer can bring down the network throughput essentially to zero by using very limited energy, see [1]. We propose and analyze intelligent jamming techniques based on “misbehaving” MAC level access timings. An additional intelligent jamming technique based o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJARCCE

سال: 2014

ISSN: 2278-1021

DOI: 10.17148/ijarcce.2014.31211