2020
DOI: 10.3390/electronics9111749
|View full text |Cite
|
Sign up to set email alerts
|

Channel-Hopping-Based Jamming Mitigation in Wireless LAN Considering Throughput and Fairness

Abstract: Because of the popularity of wireless technology, jamming attack is one of the most critical issues in wireless networks. Wireless jamming attack is one type of denial-of-service attacks where attackers send malicious messages or signal on a legitimate channel by causing intentional interference in the network. In order to avoid jamming attacks, various jamming defense schemes have been proposed. One of the popular methods is a channel-hopping scheme. However, the main challenge of this method is generating a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…In [15], Djuraev et al presented a channel hopping-based interference resilience scheme for wireless local area networks that considers throughput and fairness. The proposed scheme uses a channel hopping-based technique to reduce the packet loss rate due to interferences, minimize the impact on the network performance, increase the throughput, and promote fairness.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [15], Djuraev et al presented a channel hopping-based interference resilience scheme for wireless local area networks that considers throughput and fairness. The proposed scheme uses a channel hopping-based technique to reduce the packet loss rate due to interferences, minimize the impact on the network performance, increase the throughput, and promote fairness.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Furthermore, some smart sensors' processing power enables immediate structuring and reorganizing of sensed data [96]. Depending on the needs of the building management system (BMS), the aforementioned edge processing is employed to determine what format the data is to be shared in [97]. However, unstructured data can grow enormous, necessitating more complex searches and data mining algorithms [98].…”
Section: Iot-bim Operational Processmentioning
confidence: 99%
“…Jammer (jamming attack) is the most important problems in wireless networks. It is denial-of-service attack in which attackers send malicious signals or messages on a channel that is intended for normal traffic by intentionally interfering with the network [5]. VPN (Virtual Private Network) technology is utilized for encrypted communications between organizations based at various locations across the world [6].…”
Section: Introductionmentioning
confidence: 99%