Home > Computer Science > Computer Network > Volume-4 > Issue-6 > Jamming Attacks, Prevention and Detection

Jamming Attacks, Prevention and Detection

Call for Papers

Volume-8 | Issue-6

Last date : 27-Dec-2024

Best International Journal
Open Access | Peer Reviewed | Best International Journal | Indexing & IF | 24*7 Support | Dedicated Qualified Team | Rapid Publication Process | International Editor, Reviewer Board | Attractive User Interface with Easy Navigation

Journal Type : Open Access

First Update : Within 7 Days after submittion

Submit Paper Online

For Author

Research Area


Jamming Attacks, Prevention and Detection


Ms. Pinki R. Jha | Prof. Shambhu Rai



Ms. Pinki R. Jha | Prof. Shambhu Rai "Jamming Attacks, Prevention and Detection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6, October 2020, pp.89-92, URL: https://www.ijtsrd.com/papers/ijtsrd33214.pdf

The open nature of the wireless medium renders it weak to intentional inference attacks, typically known as jamming. Jamming attack is considered as a serious threat to the wireless communications. Reactive jamming amplifies the attack potency by jamming only when the targets are communicating, which can be easily implemented using software defined radio. The intentional intervention with wireless transmission can be used as a launch pad for increasing Denial-of-Service attacks on wireless networks. Jamming is well-known reliability threat for mass-market wireless networks. With the increase in safety-critical systems this will be possible to become a constraining issue in the future. Thus, the design of accurate jamming detection algorithms becomes critical to react to existing jamming attacks. With regards to experimental work, jamming detection has been mainly examined for sensor networks. Generally, jamming has been addressed as external threat model. However, adversary with internal knowledge of protocol condition and network secret can start low – effort jamming attacks that are hard to detect and counter. In this paper we discuss various methods of detecting the jamming attacks and methods to prevent them.

Jamming; Attacks; Collision; Signal Strength; Packet Delivery Ratio


IJTSRD33214
Volume-4 | Issue-6, October 2020
89-92
IJTSRD | www.ijtsrd.com | E-ISSN 2456-6470
Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)

International Journal of Trend in Scientific Research and Development - IJTSRD having online ISSN 2456-6470. IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas like Sciences, Technology, Innovation, Engineering, Agriculture, Management and many more and it is recommended by all Universities, review articles and short communications in all subjects. IJTSRD running an International Journal who are proving quality publication of peer reviewed and refereed international journals from diverse fields that emphasizes new research, development and their applications. IJTSRD provides an online access to exchange your research work, technical notes & surveying results among professionals throughout the world in e-journals. IJTSRD is a fastest growing and dynamic professional organization. The aim of this organization is to provide access not only to world class research resources, but through its professionals aim to bring in a significant transformation in the real of open access journals and online publishing.

Thomson Reuters
Google Scholer
Academia.edu

ResearchBib
Scribd.com
archive

PdfSR
issuu
Slideshare

WorldJournalAlerts
Twitter
Linkedin