2012
DOI: 10.5120/9435-3493
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Preventing Jamming Attacks in Wireless Communication

Abstract: Communication in wireless network is possible with an air medium. Due to the high security threats in this system, the network may face various difficulties. One of the major threat is jamming attack which comes under Denial Of Service (DOS) attack. Jamming attack is common among many exploits that compromises the wireless environment. The work of authorized users is by denying service to as legitimate traffic is jammed by the overwhelming frequencies of illegitimate traffic.In order to mitigate the impact of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…Hence, from eqs. (7) and (8), it is easy to derive closed form solutions on the border NE, (xNE, yNE) = ∆e W ( 2T AJ e∆ )+1 , 0 , which concludes the proof.…”
Section: Discussionmentioning
confidence: 57%
See 3 more Smart Citations
“…Hence, from eqs. (7) and (8), it is easy to derive closed form solutions on the border NE, (xNE, yNE) = ∆e W ( 2T AJ e∆ )+1 , 0 , which concludes the proof.…”
Section: Discussionmentioning
confidence: 57%
“…In the following we show that for any value of c T there exists a unique Stackelberg Equilibrium, and this is when the jammer does not jam the timing channel 7 . Furthermore, we show that the leader can improve its utility at the Stackelberg equilibrium if and only if c T <c T .…”
Section: A Perfect Knowledgementioning
confidence: 85%
See 2 more Smart Citations
“…At the source side message can be transferred by using local IP address of source system and the respective message then transferred in the network deployment region. [14] In network interaction model some node can act as a jammer, some of those are boundary nodes and others are monitoring nodes.…”
Section: Implementation Planmentioning
confidence: 99%