2014
DOI: 10.1109/tmc.2013.146
|View full text |Cite
|
Sign up to set email alerts
|

Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
46
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 100 publications
(46 citation statements)
references
References 25 publications
0
46
0
Order By: Relevance
“…It can be used towards almost all wireless networks, e.g. UAVs [3], ZigBee, 802.15.4, Mica-2 [4], IEEE 802.11 [5], IEEE 802.11p [6], IEEE 802.15.4a [7], Cognitive Radio Networks [8], etc. are prone to such attack.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…It can be used towards almost all wireless networks, e.g. UAVs [3], ZigBee, 802.15.4, Mica-2 [4], IEEE 802.11 [5], IEEE 802.11p [6], IEEE 802.15.4a [7], Cognitive Radio Networks [8], etc. are prone to such attack.…”
Section: Introductionmentioning
confidence: 99%
“…For securing the networks against jamming attacks, detection techniques schemes [2,5,6,8] and countermeasures [7,[9][10][11][12] were presented in some literatures. In [5], DOS attacks detection in IEEE 802.11 networks was studied, and a robust nonparametric detection mechanism for the CSMA/CA media-access control layer DOS attacks was presented. In [5] the authors studied the modeling and detecting jamming attacks against smart grid wireless networks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…They become quiet when the channel is idle, but start transmitting radio signals to undermine ongoing communication as soon as they sense activity on the wireless channel. This strategy targets the reception of a message and one advantage of a reactive jammer is that it is easy to launch but hard to detect [1]. 2.…”
Section: Introductionmentioning
confidence: 99%
“…Non-reactive jamming: Nonreactive jammers are not aware of any behavior of legitimate nodes and transmit the radio interference over the wireless channel following their own jamming strategies. Active jammers are usually effective because they keep the channel busy all the time [1]. Another simple and effective strategy for wireless DoS is the replay attack which locally heard data packets.…”
Section: Introductionmentioning
confidence: 99%