Wireless communications are potentially exposed to jamming due to the openness of the medium and, in particular, to virtual jamming, which allows more energy-efficient attacks. In this paper we tackle the problem of virtual jamming attacks on IEEE 802.11 networks and present a data fusion solution for the detection of a type of virtual jamming attack (namely, NAV attacks), based on the real-time monitoring of a set of metrics. The detection performance is evaluated in a number of real scenarios
Computer networks and more specifically wireless communication networks are increasingly becoming su...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...
Mobile Ad Hoc Networks (MANETs) is gaining popularity in recent years due to being low-cost, flexibl...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Wireless communications are potentially exposed to jamming due to the openness of the medium and, in...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Wireless communications are vulnerable to certain number of cyber-attacks and intrusion attempts due...
Abstract—Defense against denial of service (DoS) attacks is a critical component of any security sys...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
Wireless networks are nowadays indispensable components of telecommunication infrastructures. They o...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...
Abstract−The shared nature of the medium in wireless networks makes it simple for an adversary to co...
Wireless network technologies offer ubiquitous broadband access to millions of users at an affordabl...
Computer networks and more specifically wireless communication networks are increasingly becoming su...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...
Mobile Ad Hoc Networks (MANETs) is gaining popularity in recent years due to being low-cost, flexibl...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Wireless communications are potentially exposed to jamming due to the openness of the medium and, in...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Wireless communications are vulnerable to certain number of cyber-attacks and intrusion attempts due...
Abstract—Defense against denial of service (DoS) attacks is a critical component of any security sys...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
Wireless networks are nowadays indispensable components of telecommunication infrastructures. They o...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...
Abstract−The shared nature of the medium in wireless networks makes it simple for an adversary to co...
Wireless network technologies offer ubiquitous broadband access to millions of users at an affordabl...
Computer networks and more specifically wireless communication networks are increasingly becoming su...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...
Mobile Ad Hoc Networks (MANETs) is gaining popularity in recent years due to being low-cost, flexibl...