Various schemes have been proposed to handle jamming attack in the literature.One way to handle jamming attack is to design robust physical layer technologies, such as spread spectrum, which are resistant to RF jamming [7, 7, 77].uses cookies to personalize content, tailor ads and improve the user experience.
Some examples of routing attacks are: black hole, 9gray hole, wormhole, rushing attack, and frame-up [{7].
For example, the at- tackers can create a wormhole through collusion in the network to short circuit the normal °ow of routing packets [5], or can apply rushing attack to disseminate route request quickly through the network [6].
By creating a wormhole or apply- ing rushing attacks, the attackers can prevent good routes from being discovered, and increase their chance of being on discovered routes.
Once an attacker is on a certain route, it can create a black hole by dropping all the packets passing through it, or create a gray hole by selectively dropping some packets passing through it.
If the protocols have the mechanism to track malicious behavior, an attacker can also try to frame up good nodes.
In addition, an attacker can modify the packets passing through it, which has similar e®ects as dropping packets, but a little bit more severe because more network resources will be wasted when the following nodes on this route continue forwarding this corrupted packet.
The di®erence with PGP is that in their system, certi¯cates are stored and distributed by the users. have also discussed how to build security associations with the help of mobility in mobile ad hoc networks [].
Since in ad hoc network nodes relies on each other to forward packets, routing has become one of the most active research topics during the last decade, and various routing protocols have been proposed, such as DSR [7, 8], AODV [70], OLSR [5], and TBRPF [6].
In wireless ad hoc networks, since all nodes share the common communication medium, attackers can easily launch a variety of attacks ranging from passive eavesdropping from active interfering.
For example, a simple and straight-forward attack is jamming attack, where attackers can disrupt the other nodes’ normal communications by introducing interferences.
Comments Thesis Wireless Security
Thesis proposal - College of Science and Engineering
UNIVERSITY OF HOUSTON – CLEAR LAKE. 1 – INTRODUCTION. This thesis will study the security issues of wireless LANs WLANs, their vulnerability, and.…
PDF Master's Thesis A study of security in wireless and.
Master's Thesis A study of security in wireless and mobile payments By Ahmed Ali LiTH-ISY-EX--10/4157--SE 2010-06-30 Master's Thesis A study of security in.…
Evaluation of WLAN Security and Performance Publish your.
Evaluation of WLAN Security and Performance - Wireless LAN Security - Alikira. Publish your bachelor's or master's thesis, dissertation, term paper or essay.…
Master's Thesis - Eindhoven University of Technology
This document contains a student thesis bachelor's or master's. From a security perspective wireless connections are fundamentally more insecure than.…
WIRELESS LAN SECURITY IEEE 802.11b A Thesis.
There is much regulatory and standards work in the area of network security, especially in wireless network. The wireless LAN standard IEEE 802.11b provides.…
Wireless Security and User Attitude in SOHO. - ODA HiOA
May 24, 2006. My research also revealed that wireless security is one of the most. This Master thesis is written in partial fulfillment of the requirements for the.…
ISCG 9027 Master Thesis Evaluation of Wireless Network.
Abstract. 802.11 WLAN becomes one of the most implementation of wireless network. Although there is a recent research about wireless security simulation.…
The Theory and Reality of Wireless LAN Security Publish.
The Theory and Reality of Wireless LAN Security - Final Year project - Tomasz Halapacz - Bachelor Thesis - Computer Science - IT-Security - Publish your.…
Wireless Network Security Design Considerations for an. - Dtic
Specific requirements of the enterprise network. This thesis presents a layered-defense architecture to provide a scalable design for secure wireless networks.…
Study and Design of a Security Architecture for Wireless.
Network security. Special thanks goes to Joris Claessens for being the supervisor of my master's thesis and giving me helpful advice at the start of my Ph. D. I.…