Frequency jamming is known as an efficient attack tool to disrupt wireless communication. This efficiency can also be exploited for the benefit of a network – an idea often referred to as friendly jamming. A prominent application case is the blocking of unauthenticated or malicious communication such as injection attacks. In this work we propose access points as a natural place to implement friendly jamming functionality. We analyze this proposal using simulations, introduce an implementation on customer-grade access points, and report measurement results from the first real-world study of friendly jamming in an IEEE 802.11 campus network. We discover a fundamental trade-off between the effectiveness of friendly jamming and the orthogonal a...
Abstract. The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clie...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...
Frequency jamming is known as an efficient attack tool to disrupt wireless communication. This effic...
Frequency jamming is known as an efficient attack tool to disrupt wireless communication. This effic...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Resource-depletion attacks against IEEE 802,11 access points (APs) are commonly executed by flooding...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...
Abstract. The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clie...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...
Frequency jamming is known as an efficient attack tool to disrupt wireless communication. This effic...
Frequency jamming is known as an efficient attack tool to disrupt wireless communication. This effic...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Resource-depletion attacks against IEEE 802,11 access points (APs) are commonly executed by flooding...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...
Abstract. The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clie...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...