Camera ready - A Data Fusion Technique to Detect Wireless Network Virtual Jamming Attacks.pdf (324.61 kB)Download file
A data fusion technique to detect wireless network virtual jamming attacks
conference contributionposted on 2016-04-18, 13:33 authored by Gines Escudero-Andreu, Kostas KyriakopoulosKostas Kyriakopoulos, Francisco Aparicio-Navarro, David J. Parish, Diego Santoro, M. Vadursi
Wireless communications are potentially exposed to jamming due to the openness of the medium and, in particular, to virtual jamming, which allows more energy-efficient attacks. In this paper we tackle the problem of virtual jamming attacks on IEEE 802.11 networks and present a data fusion solution for the detection of a type of virtual jamming attack (namely, NAV attacks), based on the real-time monitoring of a set of metrics. The detection performance is evaluated in a number of real scenarios.
This work was supported by the Engineering and Physical Sciences Research Council (EPSRC) Grant number EP/K014307/1 and the MOD University Research Collaboration in Signal Processing.
- Mechanical, Electrical and Manufacturing Engineering
Published in3rd IEEE International Workshop on Measurements and Networking (M&N 2015)
Pages1 - 6 (6)
CitationESCUDERO-ANDREU, G. ... et al., 2015. A data fusion technique to detect wireless network virtual jamming attacks. IN: Proceedgins of 2015 3rd IEEE International Workshop on Measurements and Networking (M&N 2015), Coimbra, Portugal, 12-13 October 2015, DOI: 10.1109/IWMN.2015.7322978.
- AM (Accepted Manuscript)
Publisher statementThis work is made available according to the conditions of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) licence. Full details of this licence are available at: https://creativecommons.org/licenses/by-nc-nd/4.0/
Notes© 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.