Wireless connections are more and more used in different applications and in public areas for services to consumers but also for handling (sometimes) sensitive communications (for instance in railway systems or for remote video monitoring systems). Such systems can have to face different kind of attacks that target the behind service. Our work aims to detect, as soon as possible and online, attacks that can occur on wireless networks, to be able to react very quickly. In this paper, we present some results of data analysis methods, on Wi-Fi signals, to differentiate the ones with attacks from the ones without. This study focuses on low power jamming attacks with a slight or even no impact on Wi-Fi communications. This is more challenging th...
Wireless networks are nowadays indispensable components of telecommunication infrastructures. They o...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...
a variety of locations. This has lead to development of high level security protocols for WLAN. The ...
International audienceWireless connections are more and more used in different applications and in p...
Wireless networks have become ubiquitous, where a wide range of mobile devices are connected to a la...
International audienceIn many areas, communications or computer networks include both wired and wire...
IEEE 802.11 based Wireless LAN (WLAN) standard has been one of the most successful wireless technolo...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...
Abstract—Defense against denial of service (DoS) attacks is a critical component of any security sys...
The 802.11 wireless network revolution has not come without trouble. Since their creation, wireless...
With the breakthrough of pervasive advanced networking infrastructures and paradigms such as 5G and ...
This thesis proposes an intrusion detection system (IDS), which applies data mining clustering techn...
International audienceThe development of connected devices and their daily use are today at the orig...
In our society, Wi-Fi devices increase at an exponential rate. Users are increasingly in need of wir...
Wireless networks are nowadays indispensable components of telecommunication infrastructures. They o...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...
a variety of locations. This has lead to development of high level security protocols for WLAN. The ...
International audienceWireless connections are more and more used in different applications and in p...
Wireless networks have become ubiquitous, where a wide range of mobile devices are connected to a la...
International audienceIn many areas, communications or computer networks include both wired and wire...
IEEE 802.11 based Wireless LAN (WLAN) standard has been one of the most successful wireless technolo...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...
Abstract—Defense against denial of service (DoS) attacks is a critical component of any security sys...
The 802.11 wireless network revolution has not come without trouble. Since their creation, wireless...
With the breakthrough of pervasive advanced networking infrastructures and paradigms such as 5G and ...
This thesis proposes an intrusion detection system (IDS), which applies data mining clustering techn...
International audienceThe development of connected devices and their daily use are today at the orig...
In our society, Wi-Fi devices increase at an exponential rate. Users are increasingly in need of wir...
Wireless networks are nowadays indispensable components of telecommunication infrastructures. They o...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...
a variety of locations. This has lead to development of high level security protocols for WLAN. The ...