Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Denial of service attacks in wireless networks: The case of jammers

Pelechrinis, K and Iliofotou, M and Krishnamurthy, SV (2011) Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys and Tutorials, 13 (2). 245 - 257.

[img] Plain Text (licence)
Available under License : See the attached license file.

Download (1kB)


The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such attacks can be very easily accomplished using off-the-shelf equipment. To give a simple example, a malicious node can continually transmit a radio signal in order to block any legitimate access to the medium and/or interfere with reception. This act is called jamming and the malicious nodes are referred to as jammers. Jamming techniques vary from simple ones based on the continual transmission of interference signals, to more sophisticated attacks that aim at exploiting vulnerabilities of the particular protocol used. In this survey, we present a detailed up-to-date discussion on the jamming attacks recorded in the literature. We also describe various techniques proposed for detecting the presence of jammers. Finally, we survey numerous mechanisms which attempt to protect the network from jamming attacks. We conclude with a summary and by suggesting future directions. © 2011 IEEE.


Social Networking:
Share |


Item Type: Article
Status: Published
CreatorsEmailPitt UsernameORCID
Pelechrinis, Kkpele@pitt.eduKPELE0000-0002-6443-3935
Iliofotou, M
Krishnamurthy, SV
Date: 1 June 2011
Date Type: Publication
Journal or Publication Title: IEEE Communications Surveys and Tutorials
Volume: 13
Number: 2
Page Range: 245 - 257
DOI or Unique Handle: 10.1109/surv.2011.041110.00022
Institution: University of Pittsburgh
Schools and Programs: School of Information Sciences > Telecommunications
Refereed: Yes
Article Type: Review
Date Deposited: 24 May 2011 19:00
Last Modified: 11 Apr 2020 01:55


Monthly Views for the past 3 years

Plum Analytics

Actions (login required)

View Item View Item