International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 113 | Views: 181

Research Paper | Computer Science & Engineering | India | Volume 7 Issue 6, June 2018

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana [67] | Raj Kumar [59]

Abstract: From smart phones to wearable devices to Internet of Things (IoT) -based appliances, the demand for wireless communication keeps increasing. However, wireless communication consumes bandwidth, and the users inherently share a medium, therefore, ones signal becomes anothers interference when they collide in channel access. To cope with the increased demand in wireless, the recent developments in radio technology facilitate flexible and dynamic access and enable better adaptation to the ongoing traffic for greater spectral efficiency. A survey of various techniques available for preventing jamming attacks in wireless networks have been presented in this paper. This paper also discusses three schemes to prevent selective jamming attacks in wireless networks. A selective jammer can classify transmitted packets in real time by decoding the first few symbols of an ongoing transmission and can jam important messages. Three schemes that transform a selective jammer to a random one by preventing real-time packet classification are presented in this paper these schemes combine cryptographic primitives such as commitment schemes, cryptographic puzzles, and all-or-nothing transformations with physical-layer characteristics. To mitigate these attacks, three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes are also presented in this paper.

Keywords: Selective jamming, denial-of-service, wireless networks, packet classification

Edition: Volume 7 Issue 6, June 2018,

Pages: 1590 - 1594

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait