Protocol-Aware Radio Frequency Jamming inWi-Fi and Commercial Wireless Networks |
Hussain, Abid
(School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST))
Saqib, Nazar Abbas (College of Electrical and Mechanical Engineering, National University of Sciences and Technology (NUST)) Qamar, Usman (College of Electrical and Mechanical Engineering, National University of Sciences and Technology (NUST)) Zia, Muhammad (Department of Electronics, Quaid-i-Azam University) Mahmood, Hassan (Department of Electronics, Quaid-i-Azam University) |
1 | The Universal Software Radio Peripheral [Online]. Available: https://www.ettus.com/ |
2 | IEEE Standard for Wireless LAN-Medium Access Control and Physical Layer Specification, IEEE Standard P802.11, 1999. |
3 | D. Kotz and K. Essien. Analysis of a Campus-Wide Wireless Network [Online]. Available: http://dx.doi.org/10.1007/s11276-004-4750-0 |
4 | G. Legg. (2005) The bluejacking, bluesnarfing, bluebugging blues: Bluetooth faces perception of vulnerability [Online]. Available: http://www. wirelessnetdesignline.com/showArticle.jhtml |
5 | P. Kyasanur and N. H. Vaidya, "Detection and handling of MAC layer misbehavior in wireless networks," in Proc. IEEE DSN, 2003, pp. 173-182. |
6 | A. A. Cardenas, S. Radosavac, and J. S. Baras, "Detection and prevention ofMAC layer misbehavior in ad hoc networks" in Proc. ACMSASN, 2004, pp. 17-22. |
7 | W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming sensor networks: Attack and defense strategies," IEEE Netw., vol. 20, pp. 41-47, May 2006. DOI |
8 | G. Noubir and G. Lin, "Low-power DoS attacks in data wireless LANs and countermeasures," ACM SIGMOBILE Mob. Comput. Commun. Rev., vol. 7, pp. 29-30, July 2003. DOI |
9 | T. X. Brown J. E. James, and A. Sethi, "Jamming and sensing of encrypted wireless ad hoc networks," in Proc. ACM MobiHoc, 2006, pp. 120-130. |
10 | W. Xu,W. Trappe, and Y. Zhang, "Anti-jamming timing channels for wireless networks," in Proc. ACM WiSec, 2008, pp. 203-213. |
11 | Y. Zhang and Wenke Lee, "Intrusion detection in wireless ad-hoc networks," in Proc. ACM MobiCom, 2000, pp. 275-283. |
12 | D. Thuente and M. Acharya, "Intelligent jamming in wireless networks with applications to 802.11b and other networks," in Proc. IEEE MILCOM, Oct. 2006, pp. 1075-1081. |
13 | G. Alnifie and Robert Simon, "A multi-channel defense against jamming attacks in wireless sensor networks," in Proc. ACM Q2SWinet, 2007, pp. 1075-1081. |
14 | A. Hussain and N. A. Saqib, "Protocol aware shot-noise based radio frequency jamming method in 802.11 networks," in Proc. IEEE WOCN, 2011, pp. 1-6. |
15 | W. Xu et al., "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. ACM MobiHoc, 2005, pp. 46-57. |
16 | A. D. Wood, J. A. Stankovic, and G. Zhou, "DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks," in Proc. IEEE SECON, 2007, pp. 60-69. |
17 | IEEE Standard for Information Technology - telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements. Part 11: Wireless LANMedium Access Control (MAC) and physical layer (PHY) specifications, IEEE Standard, 2007. |
18 | Y. W. Law et al., "Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols," in Proc. ACM SASN, 2005, pp. 76-88. |
19 | Y. W. Law et al., "Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols," ACM Trans. Sen. Netw., vol. 5, no. 1, pp. 6:1-38, Feb. 2009. |
20 | The Specifications of PCMCIA 650 NIC [Online]. Available: http://www.dlink.com/products/?pid=23 |