메뉴 건너뛰기




Volumn 13, Issue 2, 2011, Pages 245-257

Denial of service attacks in wireless networks: The case of jammers

Author keywords

anti jamming; jamming; Wireless DoS; wireless security

Indexed keywords

ANTI-JAMMING; DENIAL OF SERVICE; DENIAL OF SERVICE ATTACKS; FUTURE DIRECTIONS; INTERFERENCE SIGNAL; JAMMERS; JAMMING TECHNIQUE; MALICIOUS NODES; RADIO SIGNALS; WIRELESS SECURITY;

EID: 80051801375     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2011.041110.00022     Document Type: Review
Times cited : (573)

References (69)
  • 3
    • 84885887963 scopus 로고    scopus 로고
    • [Online]. Available
    • SESP jammers. [Online]. Available: http://www.sesp.com/.
    • SESP Jammers
  • 4
    • 80051781500 scopus 로고    scopus 로고
    • [Online]. Available
    • ISM Wide Band Jammers. [Online]. Available: http://69.6.206.229/e- commerce-solutions-catalog1.0.4.html.
    • ISM Wide Band Jammers
  • 6
    • 80052034261 scopus 로고    scopus 로고
    • [Online] Available
    • Mobile Device Jammer. [Online]. Available: http://www.phonejammer. com/home.php
    • Mobile Device Jammer
  • 7
    • 80052036756 scopus 로고    scopus 로고
    • [Online] Available
    • "Jamming attack in Hackers' Conf.," [Online]. Available: http://findarticles.com/p/articles/mi\-m0EIN/is\-2005\-August\-2/ai\-n14841565.
    • Jamming Attack in Hackers' Conf
  • 8
    • 80051787666 scopus 로고    scopus 로고
    • [Online]. Available
    • Techworld news. [Online]. Available: http://www.techworld.com/mobility/ news/index.cfm?newsid=10941.
    • Techworld News
  • 9
    • 77951537189 scopus 로고    scopus 로고
    • [Online]. Available
    • RF Jamming attack. [Online]. Available: http://manageengine.adventnet. com/products/wifi-manager/rfjamming-attack.html.
    • RF Jamming Attack
  • 11
    • 49049121983 scopus 로고    scopus 로고
    • Intelligent jamming attacks, counterattacks and (counter)2 attacks in 802.11b wireless networks
    • Washington DC, USA, Aug.
    • M. Acharya and D. Thuente, "Intelligent jamming attacks, counterattacks and (counter)2 attacks in 802.11b wireless networks," in Proc. OPNETWORK-2005 Conf., Washington DC, USA, Aug. 2005.
    • (2005) Proc. OPNETWORK-2005 Conf
    • Acharya, M.1    Thuente, D.2
  • 12
    • 79961204213 scopus 로고    scopus 로고
    • On connectivity in ad hoc networks under jamming using directional antennas and mobility
    • Dec.
    • G.Noubir, "On connectivity in ad hoc networks under jamming using directional antennas and mobility," Technical Report, Dec. 2003.
    • (2003) Technical Report
    • Noubir, G.1
  • 14
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attacks and defense strategies
    • May/June
    • W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming sensor networks: Attacks and defense strategies," in IEEE Netw., May/June 2006.
    • (2006) IEEE Netw
    • Xu, W.1    A, K.M.2    Trappe, W.3    Zhang, Y.4
  • 16
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct.
    • A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Comp., vol. 35, no. 10, Oct. 2002, pp. 5462.
    • (2002) IEEE Comp. , vol.35 , Issue.10 , pp. 5462
    • Wood, A.1    Stankovic, J.2
  • 17
    • 29844445404 scopus 로고    scopus 로고
    • Low power DoS attacks in data wireless LANs and countermeasures
    • Annapolis, MD: ACM Press
    • G.Noubir and G.Lin, "Low power DoS attacks in data wireless LANs and countermeasures," in Proc. Poster: ACM MobiHoc 2003. Annapolis, MD: ACM Press.
    • (2003) Proc. Poster: ACM MobiHoc
    • Noubir, G.1    Lin, G.2
  • 18
    • 80052021809 scopus 로고    scopus 로고
    • Jamming and sensing of encrypted wireless ad hoc networks
    • May, Florence, Italy
    • T.X.Brown, J.E.James, and A.Sethi, "Jamming and sensing of encrypted wireless ad hoc networks," in MobiHoc06, 22-25 May, Florence, Italy.
    • Mobi Hoc , vol.6 , pp. 22-25
    • Brown, T.X.1    James, J.E.2    Sethi, S.3
  • 20
    • 36949015142 scopus 로고    scopus 로고
    • Understanding and mitigating the impact of RF interference on 802.11 networks
    • R. Gummadi, D. Wetheral, B. Greenstein, and S. Seshan, "Understanding and mitigating the impact of RF interference on 802.11 networks," in ACM SIGCOMM, 2007.
    • (2007) ACM SIGCOMM
    • Gummadi, R.1    Wetheral, D.2    Greenstein, B.3    Seshan, S.4
  • 22
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Aug.
    • J.Bellardo and S.Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proc. USENIX Security Sympo-sium03, Aug. 03.
    • Proc. USENIX Security Sympo-sium03 , vol.3
    • Bellardo, J.1    Savage, S.2
  • 25
    • 85008044268 scopus 로고    scopus 로고
    • Selfish MAC layer misbehavior in wireless networks
    • Sept./Oct.
    • P.Kyasanur and N.Vaidya, "Selfish MAC layer misbehavior in wireless networks," in IEEE Trans. Mobile Comput., vol. 4, no. 5, Sept./Oct. 2005.
    • (2005) IEEE Trans. Mobile Comput. , vol.4 , Issue.5
    • Kyasanur, P.1    Vaidya, N.2
  • 26
    • 70349671118 scopus 로고    scopus 로고
    • Detection selfish exploitation of carrier sensing in 802.11 networks
    • Apr. 2009
    • K. Pelechrinis, G. Yan, S. Eidenbenz and S.V. Krishnamurthy, "Detection selfish exploitation of carrier sensing in 802.11 networks," in IEEE INFOCOM 2009, Apr. 2009.
    • (2009) IEEE INFOCOM
    • Pelechrinis, K.1    Yan, G.2    Eidenbenz, S.3    Krishnamurthy, S.V.4
  • 28
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and network defenses policies in wireless sensor networks
    • M. Li, I. Koutsopoulos, and R. Pooverdan, "Optimal jamming attacks and network defenses policies in wireless sensor networks," in Proc. IEEE INFOCOM 2007.
    • (2007) Proc. IEEE INFOCOM
    • Li, M.1    Koutsopoulos, I.2    Pooverdan, R.3
  • 30
    • 34548349362 scopus 로고    scopus 로고
    • Interference mitigation through power control in high density 802.11 WLANs
    • V. P. Mhatre, K. Papagiannaki, and F. Baccelli, "Interference mitigation through power control in high density 802.11 WLANs," in IEEE INFOCOM 2007.
    • (2007) IEEE INFOCOM
    • Mhatre, V.P.1    Papagiannaki, K.2    Baccelli, F.3
  • 31
    • 33749037166 scopus 로고    scopus 로고
    • A framework for MAC protocol misbehavior detection in wireless networks
    • S. Radosavac, J. S. Barras, and I. Koutsopoulos, "A framework for MAC protocol misbehavior detection in wireless networks," in ACM WiSe, 2005.
    • (2005) ACM WiSe
    • Radosavac, S.1    Barras, J.S.2    Koutsopoulos, I.3
  • 32
    • 34547353508 scopus 로고    scopus 로고
    • A wireless distributed Intrusion Detection System and a new attack model
    • ISCC 06
    • M.D.Aime, G.Calandriello, and A.Lioy, "A wireless distributed Intrusion Detection System and a new attack model," in Proc. 11th Symp. Comput. Commun., 2006, ISCC 06.
    • (2006) Proc. 11th Symp. Comput. Commun.
    • Aime, M.D.1    Calandriello, G.2    Lioy, A.3
  • 34
    • 85087999457 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Boston, MA
    • Y.Zhang and W.Lee, "Intrusion detection in wireless ad hoc networks," in ACM MobiCom 00, Boston, MA.
    • ACM MobiCom 00
    • Zhang, Y.1    Lee, W.2
  • 35
    • 0035178273 scopus 로고    scopus 로고
    • Security enhancements in AODV protocol for wireless ad hoc networks
    • Fall Oct. 7-11, 2001
    • S.Bhargava and D.P.Agrawal, "Security enhancements in AODV protocol for wireless ad hoc networks," in VTC 2001 Fall, vol. 4, Oct. 7-11, 2001.
    • (2001) VTC , vol.4
    • Bhargava, S.1    Agrawal, D.P.2
  • 36
    • 21644434924 scopus 로고    scopus 로고
    • Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches
    • Syst., Ciudad Real, Spain. Apr. 3-6
    • P.Albers et al. "Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches," in 1st International Workshop Wireless Info., Syst., Ciudad Real, Spain, Apr. 3-6, 2002.
    • (2002) 1st International Workshop Wireless Info
    • Albers, P.1
  • 37
    • 4143084830 scopus 로고    scopus 로고
    • SVM-based intrusion detection system for wireless ad hoc networks
    • H.Deng, Q-A.Zeng, and D.P.Agrawal, "SVM-based intrusion detection system for wireless ad hoc networks," in VTC, 2003.
    • (2003) VTC
    • Deng, H.1    Zeng, Q.-A.2    Agrawal, D.P.3
  • 38
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion Detection Techniques for Mobile Wireless Networks
    • Sept.
    • Y.Zhang, W.Lee, and Y.-A.Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," in ACM J. Wireless Net., vol. 9, no. 5, Sept. 2003, pp. 545-56.
    • (2003) ACM. J. Wireless Net. , vol.9 , Issue.5 , pp. 545-56
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3
  • 39
    • 34547238643 scopus 로고    scopus 로고
    • An examination of an intrusion detection architecture for wireless ad hoc networks
    • May
    • A.B.Smith, "An examination of an intrusion detection architecture for wireless ad hoc networks," in 5th National. Colloq. Inf. Syst. Sec. Education, May 2001.
    • (2001) 5th National. Colloq. Inf. Syst. Sec. Education
    • Smith, A.B.1
  • 40
    • 84950162203 scopus 로고    scopus 로고
    • Intrusion detection using mobile agents in wireless ad hoc networks
    • July 10-12
    • O.Kachirski and R.Guha, "Intrusion detection using mobile agents in wireless ad hoc networks," in Knowledge Media Net., Proc. IEEE Wksp., July 10-12, 2002, pp. 153-58.
    • (2002) Knowledge Media Net. Proc. IEEE Wksp , pp. 153-58
    • Kachirski, O.1    Guha, R.2
  • 41
    • 11244260535 scopus 로고    scopus 로고
    • Channel surfing and spatial retreats: Defenses against wireless denial of service
    • W.Xu et al, "Channel surfing and spatial retreats: Defenses against wireless denial of service," in Proc. 2004 ACM Wksp. Wireless Security, 2004, pp.80-89.
    • (2004) Proc. 2004 ACM Wksp. Wireless Security , pp. 80-89
    • Xu, W.1
  • 44
    • 63249105839 scopus 로고    scopus 로고
    • Multi-channel jamming attachs using cognitive radios
    • A. Sampath, H. Dai, H. Zheng, and B. Y. Zhao, "Multi-channel jamming attachs using cognitive radios," in IEEE ICCCN, 2007.
    • (2007) IEEE ICCCN
    • Sampath, A.1    Dai, H.2    Zheng, H.3    Zhao, B.Y.4
  • 46
    • 24144449882 scopus 로고    scopus 로고
    • DoS analysis of reservation based MAC protocols
    • R.Negi and A.Rajeswaran, "DoS analysis of reservation based MAC protocols," in ICC, 2005.
    • (2005) ICC
    • Negi, R.1    Rajeswaran, A.2
  • 47
    • 29844445404 scopus 로고    scopus 로고
    • Poster: Low-power DoS attacks in data wireless LANs and countermeasures
    • June Annapolis MD, USA
    • G.Noubir and G.Lin, "Poster: Low-power DoS attacks in data wireless LANs and countermeasures," in MobiHoc 03, June 1-3, Annapolis, MD, USA.
    • MobiHoc 03 , pp. 1-3
    • Noubir, G.1    Lin, G.2
  • 48
    • 76749100175 scopus 로고    scopus 로고
    • On link layer denial of service in data wireless LANs
    • May
    • G.Lin and G.Noubir, "On link layer denial of service in data wireless LANs," Wireless Commun. Mobile Comput., May 2003.
    • (2003) Wireless Commun. Mobile Comput
    • Lin, G.1    Noubir, G.2
  • 51
    • 56749150049 scopus 로고    scopus 로고
    • Anti-jamming timing channels for wireless networks
    • W. Xu, W. Trappe, and Y. Zhang, "Anti-jamming timing channels for wireless networks," in ACM WiSec 2008.
    • (2008) ACM WiSec
    • Xu, W.1    Trappe, W.2    Zhang, Y.3
  • 52
    • 0024666733 scopus 로고
    • Optical orthogonal codes: Design, analysis and applications
    • F. Chung, J. Salehi, and V.Wei, "Optical orthogonal codes: design, analysis and applications," IEEE Trans. Inf. Theory, 1989.
    • (1989) IEEE Trans. Inf. Theory
    • Chung, F.1    Salehi, J.2    Wei, V.3
  • 53
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks," in INFOCOM, 2003.
    • (2003) INFOCOM
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 59
    • 77951563736 scopus 로고    scopus 로고
    • Lightweight jammer localization in wireless networks: System design and implementation
    • K. Pelechrinis, I. Koutsopoulos, I. Broustis and S.V. Krishnamurthy, "Lightweight jammer localization in wireless networks: System design and implementation," Globecom, 2009.
    • (2009) Globecom
    • Pelechrinis, K.1    Koutsopoulos, I.2    Broustis, I.3    Krishnamurthy, S.V.4
  • 60
    • 70349107957 scopus 로고    scopus 로고
    • Jamming for good: A fresh approach to authentic communication in WSNs
    • I. Martinovic, P. Pichota, and J. B. Schmitt, "Jamming for good: A fresh approach to authentic communication in WSNs," ACM WiSec, 2009.
    • (2009) ACM WiSec
    • Martinovic, I.1    Pichota, P.2    Schmitt, J.B.3
  • 63
    • 70350692585 scopus 로고    scopus 로고
    • Securing wireless sensor networks: A survey
    • Y. Zhou, Y. Fang and Y. Zhang, "Securing wireless sensor networks: A survey," IEEE Commun. Surveys Tuts., vol. 10, no. 3, pp. 6-28, 2008.
    • (2008) IEEE Commun. Surveys Tuts. , vol.10 , Issue.3 , pp. 6-28
    • Zhou, Y.1    Fang, Y.2    Zhang, Y.3
  • 65
    • 54249101364 scopus 로고    scopus 로고
    • Surveying security analysis techniques in MANET routing protocols
    • T. R. Andel and A. Yasinsac, "Surveying security analysis techniques in MANET routing protocols," IEEE Commun. Surveys Tuts., vol. 9, no. 4, pp. 70-84, 2007.
    • (2007) IEEE Commun. Surveys Tuts. , vol.9 , Issue.4 , pp. 70-84
    • Andel, T.R.1    Yasinsac, A.2
  • 66
    • 56949088196 scopus 로고    scopus 로고
    • A survey of security issues in wireless sensor networks
    • Y. Wang, G. Attebury and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Commun. Surveys Tuts., vol. 8, no. 2, pp. 2-23, 2006.
    • (2006) IEEE Commun. Surveys Tuts. , vol.8 , Issue.2 , pp. 2-23
    • Wang, Y.1    Attebury, G.2    Ramamurthy, B.3
  • 67
    • 34547610382 scopus 로고    scopus 로고
    • Secure routing for mobile ad hoc networks
    • P. G. Argyroudis and D. O'Mahony, "Secure routing for mobile ad hoc networks," IEEE Commun. Surveys Tuts., vol. 7, no. 3, pp. 2-21, 2005.
    • (2005) IEEE Commun. Surveys Tuts. , vol.7 , Issue.3 , pp. 2-21
    • Argyroudis, P.G.1    O'Mahony, D.2
  • 68
    • 33751027236 scopus 로고    scopus 로고
    • Component based channel assignment in single radio, multi-channel ad hoc networks
    • R. Vedantham, S. Kakumanu, S. Lakshmanan, and R. Sivakumar, "Component based channel assignment in single radio, multi-channel ad hoc networks," ACM MobiCom, 2006.
    • (2006) ACM MobiCom
    • Vedantham, R.1    Kakumanu, S.2    Lakshmanan, S.3    Sivakumar, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.