Abstract—Time-critical wireless applications in emerging net-work systems, such as e-healthcare and smart grids, have been drawing increasing attention in both industry and academia. The broadcast nature of wireless channels unavoidably exposes such applications to jamming attacks. However, existing methods to characterize and detect jamming attacks cannot be applied directly to time-critical networks, whose communication traffic model differs from conventional models. In this paper, we aim at modeling and detecting jamming attacks against time-critical traffic. We introduce a new metric, message invalidation ratio, to quantify the performance of time-critical applications. A key insight that leads to our modeling is that the behavior of a ...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
We consider the problem of detecting the insiderbased attacks in the form of jammers in a single-hop...
Abstract—Recently, wireless networking for emerging cyber-physical systems, in particular the smart ...
Abstract—Smart grid is a cyber-physical system that integrates power infrastructures with informatio...
International audienceMultichannel operation has been suggested for vehicular networks in order to s...
Abstract−The shared nature of the medium in wireless networks makes it simple for an adversary to co...
Nowadays wireless sensor networks (WSNs) are going to be more prone to different security threats an...
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jammin...
In the recent times, usage of timing channels was proposed in wireless domain to manage low rate, en...
Abstract—The effectiveness and straightforward implementa-tion of jammers make them an essential sec...
Abstract: The open nature of the wireless medium leaves it vulnerable to intentional interference at...
Abstract—Defense against denial of service (DoS) attacks is a critical component of any security sys...
Abstract—Smart grid is a cyber-physical system that integrates power infrastructures with informatio...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
We consider the problem of detecting the insiderbased attacks in the form of jammers in a single-hop...
Abstract—Recently, wireless networking for emerging cyber-physical systems, in particular the smart ...
Abstract—Smart grid is a cyber-physical system that integrates power infrastructures with informatio...
International audienceMultichannel operation has been suggested for vehicular networks in order to s...
Abstract−The shared nature of the medium in wireless networks makes it simple for an adversary to co...
Nowadays wireless sensor networks (WSNs) are going to be more prone to different security threats an...
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jammin...
In the recent times, usage of timing channels was proposed in wireless domain to manage low rate, en...
Abstract—The effectiveness and straightforward implementa-tion of jammers make them an essential sec...
Abstract: The open nature of the wireless medium leaves it vulnerable to intentional interference at...
Abstract—Defense against denial of service (DoS) attacks is a critical component of any security sys...
Abstract—Smart grid is a cyber-physical system that integrates power infrastructures with informatio...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
We consider the problem of detecting the insiderbased attacks in the form of jammers in a single-hop...