Defending Method Against Jamming Attack in Wireless Ad Hoc Networks

被引:2
|
作者
Ben-Othman, Jalel [1 ]
Hamieh, Ali [1 ]
机构
[1] Univ Versailles, CNRS PRiSM Lab, F-78035 Versailles, France
来源
2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009) | 2009年
关键词
Ad Hoc Networks; IEEE 802.11 MAC Protocol; Jamming Attack;
D O I
10.1109/LCN.2009.5355070
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks (MANETs) are dynamic mobile networks that can be formed in the absence of any preexisting communication infrastructure. MANETs are vulnerable to jamming attack due to their salient characteristics. The objective of a jammer is to interfere with legitimate wireless communications, and to degrade the overall QoS of the network. In this paper, we propose a new method to react at jamming attacks. The military has long dealt with jamming by using frequency-hopping spread spectrum communication. Unlike frequency hopping that takes place at the PHY layer, our purpose takes place at the MAC layer.
引用
收藏
页码:758 / 762
页数:5
相关论文
共 50 条
  • [41] On Limited-Range Strategic/Random Jamming Attacks in Wireless Ad hoc Networks
    Panyim, Korporn
    Hayajneh, Thaier
    Krishnamurthy, Prashant
    Tipper, David
    2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 922 - 929
  • [42] On Jamming Against Wireless Networks
    Amuru, SaiDhiraj
    Dhillon, Harpreet S.
    Buehrer, R. Michael
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (01) : 412 - 428
  • [43] A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    Poovendran, Radha
    Lazos, Loukas
    WIRELESS NETWORKS, 2007, 13 (01) : 27 - 59
  • [44] A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    Radha Poovendran
    Loukas Lazos
    Wireless Networks, 2007, 13 : 27 - 59
  • [45] Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks
    Azer, Marianne A.
    El-Kassas, Sherif M.
    El-Soudani, Magdy S.
    2009 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND NETWORKS COMMUNICATIONS (ICSNC 2009), 2009, : 30 - +
  • [46] Signal Strength Based Sybil Attack Detection in Wireless Ad hoc Networks
    Abbas, S.
    Merabti, M.
    Llewellyn-Jones, D.
    2009 SECOND INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2009), 2009, : 190 - 195
  • [47] A jamming-attack-defending data forwarding scheme based on channel surfing in wireless sensor networks
    Ghosal, Amrita
    Das Bit, Sipra
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (11) : 1367 - 1388
  • [48] Defending Packet Dropping Attacks Based on Dynamic Trust Model in Wireless Ad Hoc Networks
    Soleimani, Mohammad Taqi
    Kahvand, Mahboubeh
    2014 17TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (MELECON), 2014, : 362 - 366
  • [49] A Method for Improving the TCP Fairness in Wireless Ad Hoc Networks
    Dong, Linfang
    Shu, Yantai
    Sanadidi, Medy
    Gerla, Mario
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2631 - +
  • [50] A hierarchical clustering method in wireless ad hoc sensor networks
    Zhou, Y.
    Hart, M.
    Vadgama, S.
    Rouz, A.
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3503 - 3509