2014
DOI: 10.1007/978-3-319-07788-8_40
|View full text |Cite
|
Sign up to set email alerts
|

Denial-of-Service Attacks in Wireless Networks Using Off-the-Shelf Hardware

Abstract: Abstract. Wireless network technologies offer ubiquitous broadband access to millions of users at an affordable cost. However, the broadband nature of the wireless medium make these networks vulnerable to a number of attacks. Malicious interference at the physical layer, and extended packet collisions at the medium access layer can cause significant DoS attacks. In this work, we show how off-the-shelf hardware can be used to create devastating DoS attacks in a IEEE 802.11 network. Moreover, we present two algo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…Also, other types of DoS attacks may exploit the broadband nature of the wireless medium. For example, malicious interference at the physical layer, even using o -the-shelf hardware, can cause packet collisions at the media access control (MAC) layer [36].…”
Section: Preconditionmentioning
confidence: 99%
“…Also, other types of DoS attacks may exploit the broadband nature of the wireless medium. For example, malicious interference at the physical layer, even using o -the-shelf hardware, can cause packet collisions at the media access control (MAC) layer [36].…”
Section: Preconditionmentioning
confidence: 99%
“…In [1], authors have utilized cumulative-sum algorithm to detect abrupt changes in SINR. They show that the output of their proposed algorithm increases in the presence of a jammer.…”
Section: Jammer and Cheater Detection In Ieee 80211 Wlansmentioning
confidence: 99%
“…(spaced by DIFS) or during a frame transmission, the average BAT (BAT ) can be deduced from Figure 6 as follows in (1).…”
Section: An Analytical Model For Predicting Batmentioning
confidence: 99%
“…Jamming attacks can become a major concern for control systems, since they are easy to launch. The work in [ 16 ] illustrates that off-the-shelf hardware with wireless capabilities can be used for generating jamming attacks on wireless networks that use the popular IEEE 802.11 protocol. Jamming attacks can target both the physical layer and the medium access control (MAC) layer of the protocol.…”
Section: Introductionmentioning
confidence: 99%
“…In the case of physical-layer attacks, the jamming attacker is not even required to follow the wireless protocol. By simply emitting strong interference signals, the jamming attacker can cause a decrease in the Signal to Interference plus Noise Ratio (SINR), which in turn prevents the receiver to detect transmitted packets [ 16 ]. In the case of MAC-layer attacks, both the packet sender and the jamming attacker operate on the same channel; the jamming attacker’s goal is to cause packet collisions [ 16 ].…”
Section: Introductionmentioning
confidence: 99%