Jamming and Anti-Jamming Technique
Keywords:
Wireless DOS, Jamming, Wireless Security, Anti-Jamming.Abstract
The mutual way of the medium in remote net- works makes it simple for an enemy to dispatch a Wireless Disavowal of Service (WDoS) assault. Late reviews, illustrate that such assaults can be effectively proficient utilizing off-the- rack hardware. To give a basic illustration, a vindictive hub can persistently transmit a radio flag with a specific end goal to hinder any honest to goodness access to the medium as well as meddle with gathering. This demonstration is called sticking and the malevolent hubs are alluded to as jammers. Sticking methods fluctuate from basic ones based on the persistent transmission of impedance signs, to additional advanced assaults that go for misusing vulnerabilities of the specific convention utilized. In this overview, we exhibit an itemized a la mode examination on the sticking assaults recorded in the writing. We additionally portray different strategies proposed for distinguishing the nearness of jammers. At last, we review various components which endeavor to shield the system from sticking assaults. We close with a synopsis and by recommending future bearings.
References
- Q. Huang, H.Kobayashi, and B.Liu. “Modeling of distributed denial of service attacks in wireless networks,” in IEEE Pacific Rim Conf. Commun., Computers and Signal Process., vol. 1, pp. 113-127, 2003.
- L. Sherriff, “Virus launches DDoS for mobile phones,” [Online]. Available: http://www.theregister.co.uk/content/l/12394.html
- SESP jammers. [Online]. Available: http://www.sesp.com/.
- ISM Wide Band Jammers. [Online]. Available: http://69.6.206.229/ e-commerce-solutions-catalog1.0.4.html.
- ISA: “Users fear wireless networks for control," [Online]. Available: http://lists.jammed.com/ISN/2007/05/0122.html
- Mobile Device Jammer. [Online]. Available: http://www.phonejammer.com/home.php
- “Jamming attack in Hackers’ Conf.,” [Online]. Available:http://findarticles.com/p/articles/mi\_m0EIN/is\_2005\_August\_2/ai\_n14841565.
- Techworld news. [Online]. Available: http://www.techworld.com/mobility/news/index.cfm?newsid=10941.
- RF Jamming attack. [Online]. Available: http://manageengine.adventnet.com/products/wifi-manager/rfjamming-attack.html.
- W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of launching and detecting jamming attacks in wireless networks,”MobiHoc05,May25-27, 2005, Urbana-Champaign, Illinois, USA, pp 46-57.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.