Research Article | Open Access | Download PDF
Volume 3 | Issue 2 | Year 2013 | Article Id. IJPTT-V3I2P405 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I2P405Method for Preventing Selective Jamming Attacks
Umesh Kumar Awasthi and K. John Singh
Citation :
Umesh Kumar Awasthi and K. John Singh, "Method for Preventing Selective Jamming Attacks," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 2, pp. 16-19, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I2P405
Abstract
Wireless medium provides high speed wireless connectivity so, it is more vulnerable to interference attacks, called as jamming attack. This jamming interference in wireless transmissions of data can generate a DoS attacks on wireless networks. With the protocol specification knowledge and network secrets knowledge, one can reduce the efforts of jamming, so that jamming is difficult to detect and counter. Here, the addressed problem is jamming of signals in wireless transmission. Advantages of selective jamming can result in the performance degradation of system and adversary. These results are depicted by two case studies; the foremost is selective attack on routing followed by TCP attack. Security of these methods and computational overhead are also examined.
Keywords
Jamming, Routing attack, TCP attack, Adversary, DoS attack
References
[1] M. Cagalj, S. Capkun, and J.-P. Hubaux, “Wormhole-Based
Anti- Jamming Techniques in Sensor Networks,”
IEEE Trans. MobileComputing, vol. 6, no. 1, pp. 100-114,
Jan. 2007.
[2] Tague, M. Li, and R. Poovendran, “Probabilistic Mitigation of
Control Channel Jamming via Random Key Distribution,”
Proc. IEEE Int’l Symp. Personal, Indoor and Mobile Radio
Comm. (PIMRC), 2007.
[3] C. Popper, M. Strasser, and S. Capkun, “Jamming-Resistant
Broadcast Communication without Shared Keys,” Proc.
USENIX Security Symp., 2009.
[4] M. Strasser, C. Popper, S. Capkun, and M. Cagalj, “JammingResistant Key Establishment Using Uncoordinated Frequency
Hopping,” Proc. IEEE Symp. Security and Privacy, 2008.
[5] P. Tague, M. Li, and R. Poovendran, “Mitigation of Control
Channel Jamming under Node Capture Attacks,” IEEE Trans.
Mobile Computing, vol. 8, no. 9, pp. 1221-1234, Sept. 2009.
[6] Y.W. Law, M. Palaniswami, L.V. Hoesel, J. Doumen, P.
Hartel, and P. Havinga, “Energy-Efficient Link-Layer
Jamming Attacks against WSN MAC Protocols,” ACM Trans.
Sensor Networks, vol. 5, no. 1, pp. 1-38, 2009.
[7] G. Noubir and G. Lin, “Low-Power DoS Attacks in Data
Wireless Lans and Countermeasures,” Mobile Computing and
Comm. Rev., vol. 7, no. 3, pp. 29-30, 2003.