Method for preventing Selective Jamming Attacks

International Journal of P2P Network Trends and Technology (IJPTT)          
© 2013 by IJPTT Journal
Volume-3 Issue-2                           
Year of Publication : 2013
Authors : Umesh Kumar Awasthi and K. John Singh


Umesh Kumar Awasthi and K. John Singh."Method for preventing Selective Jamming Attacks". International Journal of P2P Network Trends and Technology (IJPTT), V3(2):16-20  Mar - Apr 2013, ISSN:2249-2615, Published by Seventh Sense Research Group.


Wireless medium provides high speed wireless connectivity so, it is more vulnerable to interference attacks, called as jamming attack. This jamming interference in wireless transmissions of data can generate a DoS attacks on wireless networks. With the protocol specification knowledge and network secrets knowledge, one can reduce the efforts of jamming, so that jamming is difficult to detect and counter. Here, the addressed problem is jamming of signals in wireless transmission. Advantages of selective jamming can result in the performance degradation of system and adversary. These results are depicted by two case studies; the foremost is selective attack on routing followed by TCP attack. Security of these methods and computational overhead are also examined.


[1] M. Cagalj, S. Capkun, and J.-P. Hubaux, “Wormhole-Based Anti- Jamming Techniques in Sensor Networks,” IEEE Trans. MobileComputing, vol. 6, no. 1, pp. 100-114, Jan. 2007.
[2] Tague, M. Li, and R. Poovendran, “Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution,” Proc. IEEE Int’l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC), 2007.
[3] C. Popper, M. Strasser, and S. Capkun, “Jamming-Resistant Broadcast Communication without Shared Keys,” Proc. USENIX Security Symp., 2009.


- Jamming; Routing attack; TCP attack; Adversary; DoS attack