首页> 外文会议>IEEE Pacific Rim Conference on Communications, Computers and Signal Processing >A combined approach for distinguishing different types of jamming attacks against wireless networks
【24h】

A combined approach for distinguishing different types of jamming attacks against wireless networks

机译:用于区分不同类型的无线网络的混淆攻击的组合方法

获取原文

摘要

In this paper, we devised a combined approach to distinguish different types of jamming attacks against wireless networks. Based on the shared characteristics of the wireless medium, a wireless network can be easily affected by jamming attacks, which is one of the most effective forms of denial-of-service (DoS) attacks against this type of networking architecture. Attacks can be implemented by either corrupting the operations of the medium access control (MAC) protocols or transmitting large amounts of interfering wireless signals without obeying the MAC protocols. Most jamming detection approaches cannot provide an effective way for differentiating between the various categories of jamming attacks. To enable the network to perform defense strategies more effectively, distinguishing the type of different jamming attacks is necessary. In this paper, we improve existing jamming detection approaches by using a novel statistical model and evaluate it both theoretically and experimentally. We begin by combining two existing jamming detection methods together to sort the jamming types roughly. Then, based on the statistical data of Packets Send Ratio (PSR) and Packets Delivery Ratio (PDR) in different jamming situations, we built a model to further subdivide the jamming attacks. Finally, we evaluate our proposed strategy using the ns-2 simulation platform.
机译:在本文中,我们设计了一个组合的方式来区分不同类型的干扰对无线网络的攻击的。根据无线介质的共享特性,一个无线网络可以很容易地通过干扰攻击,这是最有效的形式对这种类型的网络架构的拒绝服务(DoS)攻击一个受影响。攻击可以通过破坏介质访问控制(MAC)协议或传输大量不服从MAC协议干扰无线信号的操作来实现。大多数干扰检测方法不能提供各种类别的干扰攻击区分的有效途径。为了使网络更有效地执行防御策略,区分不同的干扰攻击的类型是必要的。在本文中,我们改进现有的干扰检测通过使用新的统计模型和方法的理论和实验上对其进行评估。首先,我们现有的两个干扰检测方法结合在一起,干扰类型大致排序。然后,基于数据包的统计数据发送比(PSR)和数据包投递率(PDR)在不同的干扰情况下,我们建立了一个模型,以进一步细分干扰攻击。最后,我们评估我们使用NS-2仿真平台提出的战略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号