Stхhlberg, 2000 - Google Patents
Radio jamming attacks against two popular mobile networksStхhlberg, 2000
View PDF- Document ID
- 11761078200532764712
- Author
- Stхhlberg M
- Publication year
External Links
Snippet
Abstract The dependence on Mobile Networks is growing. The success of the Internet was followed by Denial of Service attacks. What if the same happens to Mobile Networks? This paper gives an introduction to the concept of Radio Jamming and explores jamming …
- 238000004891 communication 0 description 35
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC [Transmission power control]
- H04W52/38—TPC being performed in particular situations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC [Transmission power control]
- H04W52/18—TPC being performed according to specific parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/14—Spectrum sharing arrangements between different networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/40—Jamming having variable characteristics
- H04K3/45—Jamming having variable characteristics characterized by including monitoring of the target or target signal, e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases, called "look-through mode"
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K2203/00—Jamming of communication; Countermeasures
- H04K2203/10—Jamming or countermeasure used for a particular application
- H04K2203/16—Jamming or countermeasure used for a particular application for telephony
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/20—Countermeasures against jamming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Stahlberg | Radio jamming attacks against two popular mobile networks | |
| US8606171B2 (en) | Methods of suppressing GSM wireless device threats in dynamic or wide area static environments using minimal power consumption and collateral interference | |
| Gummadi et al. | Understanding and mitigating the impact of RF interference on 802.11 networks | |
| Hessar et al. | Spectrum sharing between a surveillance radar and secondary Wi-Fi networks | |
| US8755770B2 (en) | Methods for identifying wireless devices connected to potentially threatening devices | |
| CA2338769C (en) | Method and system for providing personal base station communications | |
| US8767595B2 (en) | Enhanced methods of cellular environment detection when interoperating with timed interfers | |
| US8526395B2 (en) | Using code channel overrides to suppress CDMA wireless devices | |
| US7420944B2 (en) | Method of forming directional wireless networks using in-band channels | |
| US20090311963A1 (en) | Methods of Remotely Identifying, Suppressing, Disabling and Access Filtering Wireless Devices of Interest Using Signal Timing and Intercept Receivers to Effect Power Reduction, Minimization of Detection, and Minimization of Collateral Interfernce. | |
| US8477727B2 (en) | Methods for surreptitious manipulation of CDMA 2000 wireless devices | |
| Martinez et al. | On the performance evaluation of LoRaWAN under Jamming | |
| Pelechrinis et al. | On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks | |
| KR19990077280A (en) | High power short message service using dedicated carrier frequency | |
| Song et al. | Fake bts attacks of gsm system on software radio platform | |
| Misra et al. | Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks | |
| Berg | Spread spectrum in mobile communication | |
| WO2007106694A2 (en) | Methods of suppressing gsm wireless device threats in dynamic or wide area static environments using minimal power consumption and collateral interference | |
| Abdalla et al. | Performance evaluation of aerial relaying systems for improving secrecy in cellular networks | |
| WO2007027699A2 (en) | Methods of remotely identifying, suppressing, disabling and access filtering wireless devices using signal timing and intercept | |
| Andren | IEEE 802.11 wireless LAN: can we use it for multimedia? | |
| US7760697B1 (en) | Fast and long range node discovery in spread spectrum networks | |
| Furman et al. | The design of a spatial diversity model to mitigate narrowband and broadband interference in DSSS ad hoc networks | |
| Mitchell | Wireless security for secure facilities | |
| Hangargi | Denial of service attacks in wireless networks |