Defending Method Against Jamming Attack in Wireless Ad Hoc Networks

被引:2
|
作者
Ben-Othman, Jalel [1 ]
Hamieh, Ali [1 ]
机构
[1] Univ Versailles, CNRS PRiSM Lab, F-78035 Versailles, France
来源
2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009) | 2009年
关键词
Ad Hoc Networks; IEEE 802.11 MAC Protocol; Jamming Attack;
D O I
10.1109/LCN.2009.5355070
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks (MANETs) are dynamic mobile networks that can be formed in the absence of any preexisting communication infrastructure. MANETs are vulnerable to jamming attack due to their salient characteristics. The objective of a jammer is to interfere with legitimate wireless communications, and to degrade the overall QoS of the network. In this paper, we propose a new method to react at jamming attacks. The military has long dealt with jamming by using frequency-hopping spread spectrum communication. Unlike frequency hopping that takes place at the PHY layer, our purpose takes place at the MAC layer.
引用
收藏
页码:758 / 762
页数:5
相关论文
共 50 条
  • [31] Achieving Cooperative Detection against Sybil Attack in Wireless Ad Hoc Networks: A Game Theoretic Approach
    Liao, Xiaojuan
    Hao, Dong
    Sakurai, Kouichi
    17TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2011), 2011, : 806 - 811
  • [32] Against Jamming Attack in Wireless Communication Networks: A Reinforcement Learning Approach
    Ma, Ding
    Wang, Yang
    Wu, Sai
    ELECTRONICS, 2024, 13 (07)
  • [33] A dynamic mix method for wireless ad hoc networks
    Jiang, S
    Vaidya, NH
    Zhao, W
    2001 MILCOM, VOLS 1 AND 2, PROCEEDINGS: COMMUNICATIONS FOR NETWORK-CENTRIC OPERATIONS: CREATING THE INFORMATION FORCE, 2001, : 873 - 877
  • [34] Defending Jellyfish Attack in Mobile Ad hoc Networks via Novel Fuzzy System Rule
    Suseendran, G.
    Chandrasekaran, E.
    Nayyar, Anand
    DATA MANAGEMENT, ANALYTICS AND INNOVATION, ICDMAI 2018, VOL 2, 2019, 839 : 437 - 455
  • [35] Wireless Ad Hoc Networks
    Misra, Sudip
    Chen, Hsiao-Hwa
    Guizani, Mohsen
    Bhargava, Bharat K.
    IET COMMUNICATIONS, 2009, 3 (05) : 685 - 688
  • [36] Wireless ad hoc networks
    Haas, ZJ
    Gerla, M
    Johnson, DB
    Perkins, CE
    Pursley, MB
    Steenstrup, M
    Toh, CK
    Hayes, JF
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1999, 17 (08) : 1329 - 1332
  • [37] Enhanced OLSR for Defense against DOS Attack in Ad Hoc Networks
    Marimuthu, Mohanapriya
    Krishnamurthi, Ilango
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (01) : 31 - 37
  • [38] DEFENDING WIRELESS SENSOR NETWORKS FROM JAMMING ATTACKS
    Mpitziopoulos, Aristides
    Gavalas, Damianos
    Pantziou, Grammati
    Konstantopoulos, Charalampos
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 81 - +
  • [39] Anti-Jamming Games in Multi-Band Wireless Ad Hoc Networks
    Im, Hyeon-Seong
    Lee, Si-Hyeon
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 872 - 887
  • [40] A cross-layer approach to detect jamming attacks in wireless ad hoc networks
    Thamilarasu, Geethapriya
    Mishra, Sumita
    Sridhar, Ramalingam
    MILCOM 2006, VOLS 1-7, 2006, : 2586 - +