By Topic

Using Honeynodes along with Channel Surfing for Defense against Jamming Attacks in Wireless Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Dhurandher, S.K. ; Dept. of Inf. Technol., Netaji Subhas Inst. of Technol., Delhi ; Misra, S. ; Agrawal, D. ; Rayankula, A.

The advent of wireless networks has brought a new set of security issues with it. The most feared of these is a jamming based attack. This is because with the existing network architecture, there is very little that can be done to overcome a jamming attack. In this paper we propose a pre-emptive detection strategy using honeynodes and a response mechanism based on the existing channel surfing algorithm to protect wireless nodes from a jammer. Honeynodes generate dummy communication at a frequency close to the actual frequency of operation, so that the authentic nodes can jump to another frequency even before a jammer starts scanning that frequency. We have implemented the proposed method using ns2. Experimental results show a marked improvement in the performance in our proposed system over the existing channel surfing algorithm.

Published in:

Systems and Networks Communications, 2008. ICSNC '08. 3rd International Conference on

Date of Conference:

26-31 Oct. 2008