Countering Intelligent Jamming with Full Protocol Stack Agility

2014 
Intelligent jamming (IJ) attacks go beyond applying brute-force power at the physical link, exploiting vulnerabilities specific to protocols or configurations. IJ attackers who can gain a foothold into a network by understanding and exploiting vulnerabilities can operate with a much lower chance of detection and a greater impact on the network. For example, one IJ technique exploits media access control (MAC) layer packet structure to selectively jam packets originating from or destined to a specific user. This project aims to create a moving target in the network protocol stack to mitigate IJ attacks. It introduces protocol agility at all layers of the stack to make such protocol-driven attacks infeasible.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    7
    References
    10
    Citations
    NaN
    KQI
    []