The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a lowpower jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In other words, the total throughput provided by the corresponding AP is drastically degraded. To fight against this attack, we design FIJI, a cross-layer anti-jamming system that detects such intelligent jammers and mitigates their impact on network performance. FIJI looks for anomalies in the AP load distribution to efficiently perform jammer detection. It ...
In wireless networks, users share a transmission medium. For efficient channel use, wireless systems...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Abstract. The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clie...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Abstract—In this paper, we study the performance of the IEEE 802.11 MAC protocol under a range of ja...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Abstract We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that cove...
In wireless networks, users share a transmission medium. For efficient channel use, wireless systems...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Abstract. The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clie...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Abstract—In this paper, we study the performance of the IEEE 802.11 MAC protocol under a range of ja...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Abstract We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that cove...
In wireless networks, users share a transmission medium. For efficient channel use, wireless systems...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...