Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit intermittently at low power in order to conserve energy. In this paper, we first conduct extensive experiments on an indoor 802.11 network to assess the ability of two physical layer functions, rate adaptation and power control, in mitigating jamming. In the presence of a jammer we find that: (a) the use of popular rate adaptation algorithms can significantly degrade network performance and, (b) appropriate tuning of the carrier sensing threshold allows a transmitter to send packets even when being jammed and enables a receiver capture the desired signal. Based on o...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Thesis (M.S.)--Boston University PLEASE NOTE: Boston University Libraries did not receive an Author...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Abstract. The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clie...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Thesis (M.S.)--Boston University PLEASE NOTE: Boston University Libraries did not receive an Author...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Abstract. The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clie...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
IEEE 802.11 Wireless LANs (WLANs) are highly sensitive to Denial of Service (DoS) attacks carried ou...
Thesis (M.S.)--Boston University PLEASE NOTE: Boston University Libraries did not receive an Author...
Quality of Service for data traffic is an important facet of a network, which in the case of a wirel...