Jamming and Anti-Jamming Technique

Authors

  • Amrinder Kaur  
  • Noor Sharma  
  • Rajvir Kaur  
  • Er. C. K. Raina   

Keywords:

Wireless DOS, Jamming, Wireless Security, Anti-Jamming.

Abstract

The mutual way of the medium in remote net- works makes it simple for an enemy to dispatch a Wireless Disavowal of Service (WDoS) assault. Late reviews, illustrate that such assaults can be effectively proficient utilizing off-the- rack hardware. To give a basic illustration, a vindictive hub can persistently transmit a radio flag with a specific end goal to hinder any honest to goodness access to the medium as well as meddle with gathering. This demonstration is called sticking and the malevolent hubs are alluded to as jammers. Sticking methods fluctuate from basic ones based on the persistent transmission of impedance signs, to additional advanced assaults that go for misusing vulnerabilities of the specific convention utilized. In this overview, we exhibit an itemized a la mode examination on the sticking assaults recorded in the writing. We additionally portray different strategies proposed for distinguishing the nearness of jammers. At last, we review various components which endeavor to shield the system from sticking assaults. We close with a synopsis and by recommending future bearings.

References

  1. Q. Huang, H.Kobayashi, and B.Liu. “Modeling of distributed denial of service attacks in wireless networks,” in IEEE Pacific Rim Conf. Commun., Computers and Signal Process., vol. 1, pp. 113-127, 2003.
  2. L. Sherriff, “Virus launches DDoS for mobile phones,” [Online]. Available: http://www.theregister.co.uk/content/l/12394.html
  3. SESP jammers. [Online]. Available: http://www.sesp.com/.
  4. ISM Wide Band Jammers. [Online]. Available: http://69.6.206.229/ e-commerce-solutions-catalog1.0.4.html.
  5. ISA: “Users fear wireless networks for control," [Online]. Available: http://lists.jammed.com/ISN/2007/05/0122.html
  6. Mobile Device Jammer. [Online]. Available: http://www.phonejammer.com/home.php
  7. “Jamming attack in Hackers’ Conf.,” [Online]. Available:http://findarticles.com/p/articles/mi\_m0EIN/is\_2005\_August\_2/ai\_n14841565.
  8. Techworld news. [Online]. Available: http://www.techworld.com/mobility/news/index.cfm?newsid=10941.
  9. RF Jamming attack. [Online]. Available: http://manageengine.adventnet.com/products/wifi-manager/rfjamming-attack.html.
  10. W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of launching and detecting jamming attacks in wireless networks,”MobiHoc05,May25-27, 2005, Urbana-Champaign, Illinois, USA, pp 46-57.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Amrinder Kaur, Noor Sharma, Rajvir Kaur, Er. C. K. Raina , " Jamming and Anti-Jamming Technique, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.1067-1070, March-April-2017.