The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a low-power jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In other words, the total throughput provided by the corresponding AP is drastically degraded. To fight against this attack, we design FIJI, a cross-layer antijamming system that detects such intelligent jammers and mitigates their impact on network performance. FIJI looks for anomalies in the AP load distribution to efficiently perform jammer detection. It ...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Abstract—In this paper, we study the performance of the IEEE 802.11 MAC protocol under a range of ja...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...
Abstract. The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clie...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Abstract—In this paper, we study the performance of the IEEE 802.11 MAC protocol under a range of ja...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...
Abstract. The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clie...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Abstract—In this paper, we study the performance of the IEEE 802.11 MAC protocol under a range of ja...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...