Abstract. The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advan-tage of this behavioral trait: the placement of a low-power jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In other words, the total throughput provided by the corresponding AP is dras-tically degraded. To fight against this attack, we design FIJI, a cross-layer anti-jamming system that detects such intelligent jammers and mitigates their impact on network performance. FIJI looks for anomalies in the AP load distribution to efficiently perform jammer d...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Abstract We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that cove...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Abstract—In this paper, we study the performance of the IEEE 802.11 MAC protocol under a range of ja...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Abstract We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that cove...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Abstract—In this paper, we study the performance of the IEEE 802.11 MAC protocol under a range of ja...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Abstract We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that cove...