[go: up one dir, main page]

Stхhlberg, 2000 - Google Patents

Radio jamming attacks against two popular mobile networks

Stхhlberg, 2000

View PDF
Document ID
11761078200532764712
Author
Stхhlberg M
Publication year

External Links

Snippet

Abstract The dependence on Mobile Networks is growing. The success of the Internet was followed by Denial of Service attacks. What if the same happens to Mobile Networks? This paper gives an introduction to the concept of Radio Jamming and explores jamming …
Continue reading at www.ladyada.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC [Transmission power control]
    • H04W52/38TPC being performed in particular situations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC [Transmission power control]
    • H04W52/18TPC being performed according to specific parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/45Jamming having variable characteristics characterized by including monitoring of the target or target signal, e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases, called "look-through mode"
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • H04K2203/16Jamming or countermeasure used for a particular application for telephony
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/20Countermeasures against jamming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control

Similar Documents

Publication Publication Date Title
Stahlberg Radio jamming attacks against two popular mobile networks
US8606171B2 (en) Methods of suppressing GSM wireless device threats in dynamic or wide area static environments using minimal power consumption and collateral interference
Gummadi et al. Understanding and mitigating the impact of RF interference on 802.11 networks
Hessar et al. Spectrum sharing between a surveillance radar and secondary Wi-Fi networks
US8755770B2 (en) Methods for identifying wireless devices connected to potentially threatening devices
CA2338769C (en) Method and system for providing personal base station communications
US8767595B2 (en) Enhanced methods of cellular environment detection when interoperating with timed interfers
US8526395B2 (en) Using code channel overrides to suppress CDMA wireless devices
US7420944B2 (en) Method of forming directional wireless networks using in-band channels
US20090311963A1 (en) Methods of Remotely Identifying, Suppressing, Disabling and Access Filtering Wireless Devices of Interest Using Signal Timing and Intercept Receivers to Effect Power Reduction, Minimization of Detection, and Minimization of Collateral Interfernce.
US8477727B2 (en) Methods for surreptitious manipulation of CDMA 2000 wireless devices
Martinez et al. On the performance evaluation of LoRaWAN under Jamming
Pelechrinis et al. On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks
KR19990077280A (en) High power short message service using dedicated carrier frequency
Song et al. Fake bts attacks of gsm system on software radio platform
Misra et al. Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks
Berg Spread spectrum in mobile communication
WO2007106694A2 (en) Methods of suppressing gsm wireless device threats in dynamic or wide area static environments using minimal power consumption and collateral interference
Abdalla et al. Performance evaluation of aerial relaying systems for improving secrecy in cellular networks
WO2007027699A2 (en) Methods of remotely identifying, suppressing, disabling and access filtering wireless devices using signal timing and intercept
Andren IEEE 802.11 wireless LAN: can we use it for multimedia?
US7760697B1 (en) Fast and long range node discovery in spread spectrum networks
Furman et al. The design of a spatial diversity model to mitigate narrowband and broadband interference in DSSS ad hoc networks
Mitchell Wireless security for secure facilities
Hangargi Denial of service attacks in wireless networks