Defending Method Against Jamming Attack in Wireless Ad Hoc Networks

被引:2
|
作者
Ben-Othman, Jalel [1 ]
Hamieh, Ali [1 ]
机构
[1] Univ Versailles, CNRS PRiSM Lab, F-78035 Versailles, France
来源
2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009) | 2009年
关键词
Ad Hoc Networks; IEEE 802.11 MAC Protocol; Jamming Attack;
D O I
10.1109/LCN.2009.5355070
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks (MANETs) are dynamic mobile networks that can be formed in the absence of any preexisting communication infrastructure. MANETs are vulnerable to jamming attack due to their salient characteristics. The objective of a jammer is to interfere with legitimate wireless communications, and to degrade the overall QoS of the network. In this paper, we propose a new method to react at jamming attacks. The military has long dealt with jamming by using frequency-hopping spread spectrum communication. Unlike frequency hopping that takes place at the PHY layer, our purpose takes place at the MAC layer.
引用
收藏
页码:758 / 762
页数:5
相关论文
共 50 条
  • [11] Defending against wormhole attacks in mobile ad hoc networks
    Wang, Weichao
    Bhargava, Bharat
    Lu, Yi
    Wu, Xiaoxin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (04): : 483 - 503
  • [12] Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
    Poongodi, T.
    Khan, Mohammed S.
    Patan, Rizwan
    Gandomi, Amir H.
    Balusamy, Balamurugan
    IEEE ACCESS, 2019, 7 : 18409 - 18419
  • [13] Mitigating the effect of jamming signals in wireless ad hoc and sensor networks
    Sarker, J. H.
    Mouftah, H. T.
    IET COMMUNICATIONS, 2012, 6 (03) : 311 - 317
  • [14] Null Frequency Jamming of Dynamic Routing in Wireless Ad Hoc Networks
    Balakrishnan, Manikanden
    Huang, Hong
    Jaradat, Yousef
    Pawar, Sandeep
    Misra, Satyajayant
    Asorey-Cacheda, Rafael
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [15] Enhanced Security Scheme against Jamming attack in Mobile Ad hoc Network
    Sharma, Priyanka
    Suryawanshi, Anil
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [16] Effective and Efficient Jamming Based on Routing in Wireless Ad Hoc Networks
    Lee, Jae-Joon
    Lim, Jaesung
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (11) : 1903 - 1906
  • [17] Increasing attack resiliency of wireless ad hoc and sensor networks
    Vogt, H
    25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 179 - 184
  • [18] Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks
    Tamilselvan, Latha
    Sankaranarayanan, V.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (03): : 118 - 123
  • [19] Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [20] An approach to mitigate wormhole attack in wireless ad hoc networks
    Lee, Gunhee
    Kim, Dong-kyoo
    Seo, Jungtaek
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 220 - +