SlideShare a Scribd company logo
International Journal of Game Theory and Technology (IJGTT), Vol.1, 2015
41
USE OF JAMMER NETWORK TO DETECT
DENIAL OF SERVICES ATTACK IN WIRELESS
NETWORK
P.MOHANRAJ, A.MUMMOORTHY
1
Master of Computer Science and Engineering ,K.S.R. College of
EngineeringTiruchengode, India
2
Assisant Professor, Department of CSE,K.S.R. College of Engineering, Tiruchengode,
India
ABSTRACT:
The most important aspect of network is to share the data from one to another. It can either wired or
wireless. Both networks provides similar kind of security only. The internet users can have experience of
denial of services attack for hacking the data, to avoid the such a hacking provides many techniques to
resolve the problem. The jammer is an electronic device used to distrupt the communication. The jammer is
made of large number of tiny low power distributed jammer. Use of jammer to avoid the hacking of data. In
a network the node setup purpose uses they percolation concept. Based on the network, jammer,
performance are evaluated. Finally provides the results in simulation tool such as NS2.
KEY WORDS:
Network, Distrupt, DoS, Jammer, Percolation
1. INTRODUCTION
The wireless network can transfer the data threw the access point. The access point need not
reach all the nodes in the network.
FIG.1: Wireless network components
1.1 Security in Wireless Network
A.Confidentiality
B.Integrity
C. Availability
International Journal of Game Theory and Technology (IJGTT), Vol.1, 2015
42
1.2Denial of services attack
It is very common attack to wireless network. It may slow down or totally interrupt the service of
a system.
1.2 Distributed jammer network (DJN)
Jammer is an electronic device used to disrupt the communication.Jammers are used by military
and civilian applications because DJN can be deployed to form a low power (possibly air-born)
jamming dust to disrupt the communication.
1.3.1 Advantage of DJN
A. Robust
B.Low power
1.3.2 Types of jammer
A.Constant jammer
B. Deceptive jammer
C. Random jammer
2. PHASE TRANSITION USING PERCOLATION THEORY
We consider a random connection model where each pair of points(xi, xj ) of a Poisson point
process of density λ is connected with probability g(xi −xj ), for some given function g :R2→[0,
1]. All connections areindependent of each other.
It is well knownfor g that for any function g, H there is a critical value λc(g) that ensures
connectivity almost surely (a.s.), i.e., with probability one. This is defined as 0<λc(g)=inf {λ :
∃
infinite connected component a.s.}<∞.
When λ > λc we say that the random connection model percolates.The value of g(x) is 0 means
the nodes are said to be inside the network, if the value is 1 means the nodes are said to be
outside. To make inside the following two transformation methods used.
2.1 Squishing and Squashing Transformation
In this transformation technique used to transfer the data from one to another. Uses some
mathematical notations. G and H are they two functions have the probability value of (0,1). The
value is 0 means ready to transform if the value is 1make the adjustment to transform from one to
another.
2.2 Shifting and Squeezing Transformation
We call this transformation gshifts (x). Here we “shift” the function goutwards distance s,but
squeeze the function after that, so that it has the same effective area.
International Journal of Game Theory and Technology (IJGTT), Vol.1, 2015
43
3. JAMMER EFFECTIVENESS
There are two metrics used to measure the effectiveness of a jammer that is PSR and PDR. In
PDR the ratio of packet that are successfully delivered to a destination compared with number of
packets send by the source. In PSR the sender can the data threw the receiver successfully.
3.1 Detecting jamming attacks
Three ways to detect them jamming attacks signal strength, carrier sensing time(CST) and PDR.
In signal strength uses two approaches.In CST node A senes the channel by trying to send out a
beacon to the node B. It obtain the channel sensing time D by calculating the difference between
the time when beacon packets reach the destination sucessfully. In PDR has to be done in two
ways sender site or receiver site. In sender site the PDR can be calculated by keeping track of
how many acknowledgement it receiver from the receiver. In receiver site the PDR can be
calculated using the ratio of the number of packets the CRC with respect to the number of
packets received.
FIG 2. Over All System Architecture
4. RELATED WORK
Jamming assault on wireless networks was usually treated from the viewpoint of human being
jammers. We advocate a move toward based on the network viewpoint, and using this networked
approach we show that some attractive results can be obtained. We used show that DJN can
cause a stage transition in the presentation of the objective network. We employ percolation
assumption to explain such phase change, to analyze the impact of DJN on the connectivity of the
target network, and to give lower and upper bounds for the percolation of the objective network
to come about in the presence of DJN. To providing a large scaling examination of the jamming
in relation to the jammer node with density, we present simulation results recitation the impact of
DJN topology on the jamming efficiency. In proposed system to demonstrated that DJN can
International Journal of Game Theory and Technology (IJGTT), Vol.1, 2015
44
cause a phase change in target network presentation even when the total overcrowding power is
held stable. We explained the stage changeover using percolation theory, analyzed scaling
performance of node thickness and numeral of nodes in DJN, and we also investigate the impact
of DJN topology on the overcrowding effectiveness. We believe awaiting the problem of
jamming in wireless networks from a set of connections perspective can broaden the investigate
scope significantly and can bring out some motivating results otherwise unachievable by focusing
on person jammers. Also using we think the interaction between DJN and DWN makes for
intriguing problems, which cut across system layers: device assignment, topology control,
authority control, medium access, routing, and data transport. Investigating those troubles can
result in deeper sympathetic of not only DJN but DWN as well. We believe a group more
interesting consequences can be obtain from this move toward and are currently operational in
this course.
4.1 Result analysis
In this figure the nodes are created with different distance. It also sets the attacker and source,
destination.
International Journal of Game Theory and Technology (IJGTT), Vol.1, 2015
45
The attacker can hack the information. After hacking the information the source can choose the
other path to receive the destination. The jammers aretaken the authenticated data.
5. CONCLUSION
The Reactive Defence Mechanism it’s used to moderate the DDoS attack and additional get better
system presentation in conditions of a smaller amount working out time. Supplementary the
reproduction product proves it to be an enhanced result leaning approach. Secondly we need a
systematic procedure for setting the parameters according to the network environment for our
proposed algorithm so that it shows effective results against real proof DDoS traffics. Using the
Reactive defence mechanism the data will be preventing for DDOS attack to the transmission of
networks.
REFERENCE
[1] C. Schleher, Electronic Warfare in the Information Age. Artech House,1999.
[2] D. Wood and J. A. Stankovic, “Denial of service in sensor networks,"IEEE Comput., vol. 35, no. 10,
pp. 54-62, 2002.
[3] J. Bellardo and S. Savage, “802.11 denial-of-service attacks: real vulnerabilities and practical
solutions," in Proc. USENIX Security Symp., pp. 15-28, 2003.
[4] G. Noubir and G. Lin, “Low-power DoS attacks in data wireless LANs and countermeasures,"
SIGMOBILE Mob. Comput. Commun. Rev., vol. 7, no. 3, pp. 29-30, 2003.
[5] J. M. McCune, E. Shi, A. Perrig, andM. K. Reiter, “Detection of denialof-message attacks on sensor
network broadcasts," in Proc. IEEE Symp.Security Privacy, 2005.
[6] W. Xu et al., “The feasibility of launching and detecting jamming attacks in wireless networks," in
Proc. ACM Int’l. Symp. Mobile Ad Hoc Netw. Comput., 2005, pp. 46-57.
[7] W. Xu, T. Wood, W. Trappe, and Y. Zhang, “Channel surfing and spatial retreats: defenses against
wireless denial of service," in Proc. ACM Workshop Wireless Security, pp. 80-89, 200
[8] Q.Huang, H.Kobayashi, and B.Liu. “Modeling of distributed denialof service attacks in wireless
networks,” in IEEE Pacific Rim Conf.Commun., Computers and Signal Process., vol. 1, pp. 113-127,
2003
[9] L.Sherriff, “Virus launches DDoS for mobile phones,” [Online]. Available:
[10] Available: http:// www.scalable-networks.com/.
[11]Available: http://news.bbc.co.uk/
[12]available: http://games.slashdot.org/

More Related Content

PDF
Ameliorate the performance using soft computing approaches in wireless networks
PDF
Ijnsa050209
PDF
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
PDF
Secure data storage over distributed nodes in network through broadcast techn...
PDF
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
PDF
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
PDF
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
PDF
Black hole and greyhole attack in wireless mesh network
Ameliorate the performance using soft computing approaches in wireless networks
Ijnsa050209
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Secure data storage over distributed nodes in network through broadcast techn...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
Black hole and greyhole attack in wireless mesh network

Similar to USE OF JAMMER NETWORK TO DETECT DENIAL OF SERVICES ATTACK IN WIRELESS NETWORK (20)

PDF
Indoor Localization in Wireless Sensor Networks
PDF
Iaetsd game theory and auctions for cooperation in
PDF
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
PDF
Packet hiding methods for preventing selective
PDF
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
PDF
Characterization of directed diffusion protocol in wireless sensor network
PDF
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
PDF
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
PDF
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
PPTX
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
PDF
Optimized rationalize security and efficient data gathering in wireless senso...
PDF
G0261041046
PDF
G0261041046
PDF
International Journal of Engineering and Science Invention (IJESI)
DOCX
A trigger identification service for defending reactive jammers in wireless s...
PDF
Wormhole attack detection algorithms in wireless network coding systems
PDF
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
PDF
The shadowing propagation model
PDF
A1803060110
Indoor Localization in Wireless Sensor Networks
Iaetsd game theory and auctions for cooperation in
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
Packet hiding methods for preventing selective
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
Characterization of directed diffusion protocol in wireless sensor network
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
Optimized rationalize security and efficient data gathering in wireless senso...
G0261041046
G0261041046
International Journal of Engineering and Science Invention (IJESI)
A trigger identification service for defending reactive jammers in wireless s...
Wormhole attack detection algorithms in wireless network coding systems
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
The shadowing propagation model
A1803060110
Ad

More from cadilasoomen (20)

PDF
10th International Conference on Education (EDU 2025)
PDF
3rd International Conference on Education & Information Technology (EDUIT 2025)
PDF
3rd International Conference on Educational Research (EDUR 2025)
PDF
PREDICTING THE EVOLUTION OF CONFLICTS USING FUZZY RECURRENT GAMES
PDF
3rd International Conference on Education & Information Technology (EDUIT 2025)
PDF
Tessellations and Sweeping Nets: Advancing the Calculus of Geometric Logic
PDF
3rd International Conference on Educational Research (EDUR 2025)
PDF
A CHARACTERIZATION OF THE EGALITARIAN CORRESPONDENCE IN THE CONTEXT OF BARGAI...
PDF
3rd International Conference on Educational Research (EDUR 2025)
PDF
PREDICTING THE REPLICATOR EQUATION USING DEEP LEARNING IN EVOLUTIONARY DYNAMICS
PDF
3rd International Conference on Educational Research (EDUR 2025)
PDF
3rd International Conference on Education in Post Pandemic (EDUPAN 2025)
PDF
COOPERATION AND THE CARBON TRADING GAME: A SYSTEM DYNAMICS APPROACH TO THE PR...
PDF
APPLICATION OF THE WAR OF ATTRITION GAME TO THE ANALYSIS OF INTELLECTUAL PROP...
PDF
COOPERATION AND THE CARBON TRADING GAME: A SYSTEM DYNAMICS APPROACH TO THE PR...
PDF
CUREENT ISSUE : A WEARABLE HAPTIC GAME CONTROLLER
PDF
PREDICTING THE REPLICATOR EQUATION USING DEEP LEARNING IN EVOLUTIONARY DYNAMICS
PDF
PREDICTING THE EVOLUTION OF CONFLICTS USING FUZZY RECURRENT GAMES
PDF
4th International Conference on Education and Technology (EDUTEC 2025)
PDF
PREDICTING THE REPLICATOR EQUATION USING DEEP LEARNING IN EVOLUTIONARY DYNAMICS
10th International Conference on Education (EDU 2025)
3rd International Conference on Education & Information Technology (EDUIT 2025)
3rd International Conference on Educational Research (EDUR 2025)
PREDICTING THE EVOLUTION OF CONFLICTS USING FUZZY RECURRENT GAMES
3rd International Conference on Education & Information Technology (EDUIT 2025)
Tessellations and Sweeping Nets: Advancing the Calculus of Geometric Logic
3rd International Conference on Educational Research (EDUR 2025)
A CHARACTERIZATION OF THE EGALITARIAN CORRESPONDENCE IN THE CONTEXT OF BARGAI...
3rd International Conference on Educational Research (EDUR 2025)
PREDICTING THE REPLICATOR EQUATION USING DEEP LEARNING IN EVOLUTIONARY DYNAMICS
3rd International Conference on Educational Research (EDUR 2025)
3rd International Conference on Education in Post Pandemic (EDUPAN 2025)
COOPERATION AND THE CARBON TRADING GAME: A SYSTEM DYNAMICS APPROACH TO THE PR...
APPLICATION OF THE WAR OF ATTRITION GAME TO THE ANALYSIS OF INTELLECTUAL PROP...
COOPERATION AND THE CARBON TRADING GAME: A SYSTEM DYNAMICS APPROACH TO THE PR...
CUREENT ISSUE : A WEARABLE HAPTIC GAME CONTROLLER
PREDICTING THE REPLICATOR EQUATION USING DEEP LEARNING IN EVOLUTIONARY DYNAMICS
PREDICTING THE EVOLUTION OF CONFLICTS USING FUZZY RECURRENT GAMES
4th International Conference on Education and Technology (EDUTEC 2025)
PREDICTING THE REPLICATOR EQUATION USING DEEP LEARNING IN EVOLUTIONARY DYNAMICS
Ad

Recently uploaded (20)

PPT
Occupational Health and Safety Management System
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
Current and future trends in Computer Vision.pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
737-MAX_SRG.pdf student reference guides
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Soil Improvement Techniques Note - Rabbi
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
communication and presentation skills 01
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
86236642-Electric-Loco-Shed.pdf jfkduklg
PDF
PPT on Performance Review to get promotions
PPT
Total quality management ppt for engineering students
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Occupational Health and Safety Management System
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Abrasive, erosive and cavitation wear.pdf
Current and future trends in Computer Vision.pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
737-MAX_SRG.pdf student reference guides
Exploratory_Data_Analysis_Fundamentals.pdf
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Fundamentals of safety and accident prevention -final (1).pptx
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
UNIT 4 Total Quality Management .pptx
Soil Improvement Techniques Note - Rabbi
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
communication and presentation skills 01
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
86236642-Electric-Loco-Shed.pdf jfkduklg
PPT on Performance Review to get promotions
Total quality management ppt for engineering students
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf

USE OF JAMMER NETWORK TO DETECT DENIAL OF SERVICES ATTACK IN WIRELESS NETWORK

  • 1. International Journal of Game Theory and Technology (IJGTT), Vol.1, 2015 41 USE OF JAMMER NETWORK TO DETECT DENIAL OF SERVICES ATTACK IN WIRELESS NETWORK P.MOHANRAJ, A.MUMMOORTHY 1 Master of Computer Science and Engineering ,K.S.R. College of EngineeringTiruchengode, India 2 Assisant Professor, Department of CSE,K.S.R. College of Engineering, Tiruchengode, India ABSTRACT: The most important aspect of network is to share the data from one to another. It can either wired or wireless. Both networks provides similar kind of security only. The internet users can have experience of denial of services attack for hacking the data, to avoid the such a hacking provides many techniques to resolve the problem. The jammer is an electronic device used to distrupt the communication. The jammer is made of large number of tiny low power distributed jammer. Use of jammer to avoid the hacking of data. In a network the node setup purpose uses they percolation concept. Based on the network, jammer, performance are evaluated. Finally provides the results in simulation tool such as NS2. KEY WORDS: Network, Distrupt, DoS, Jammer, Percolation 1. INTRODUCTION The wireless network can transfer the data threw the access point. The access point need not reach all the nodes in the network. FIG.1: Wireless network components 1.1 Security in Wireless Network A.Confidentiality B.Integrity C. Availability
  • 2. International Journal of Game Theory and Technology (IJGTT), Vol.1, 2015 42 1.2Denial of services attack It is very common attack to wireless network. It may slow down or totally interrupt the service of a system. 1.2 Distributed jammer network (DJN) Jammer is an electronic device used to disrupt the communication.Jammers are used by military and civilian applications because DJN can be deployed to form a low power (possibly air-born) jamming dust to disrupt the communication. 1.3.1 Advantage of DJN A. Robust B.Low power 1.3.2 Types of jammer A.Constant jammer B. Deceptive jammer C. Random jammer 2. PHASE TRANSITION USING PERCOLATION THEORY We consider a random connection model where each pair of points(xi, xj ) of a Poisson point process of density λ is connected with probability g(xi −xj ), for some given function g :R2→[0, 1]. All connections areindependent of each other. It is well knownfor g that for any function g, H there is a critical value λc(g) that ensures connectivity almost surely (a.s.), i.e., with probability one. This is defined as 0<λc(g)=inf {λ : ∃ infinite connected component a.s.}<∞. When λ > λc we say that the random connection model percolates.The value of g(x) is 0 means the nodes are said to be inside the network, if the value is 1 means the nodes are said to be outside. To make inside the following two transformation methods used. 2.1 Squishing and Squashing Transformation In this transformation technique used to transfer the data from one to another. Uses some mathematical notations. G and H are they two functions have the probability value of (0,1). The value is 0 means ready to transform if the value is 1make the adjustment to transform from one to another. 2.2 Shifting and Squeezing Transformation We call this transformation gshifts (x). Here we “shift” the function goutwards distance s,but squeeze the function after that, so that it has the same effective area.
  • 3. International Journal of Game Theory and Technology (IJGTT), Vol.1, 2015 43 3. JAMMER EFFECTIVENESS There are two metrics used to measure the effectiveness of a jammer that is PSR and PDR. In PDR the ratio of packet that are successfully delivered to a destination compared with number of packets send by the source. In PSR the sender can the data threw the receiver successfully. 3.1 Detecting jamming attacks Three ways to detect them jamming attacks signal strength, carrier sensing time(CST) and PDR. In signal strength uses two approaches.In CST node A senes the channel by trying to send out a beacon to the node B. It obtain the channel sensing time D by calculating the difference between the time when beacon packets reach the destination sucessfully. In PDR has to be done in two ways sender site or receiver site. In sender site the PDR can be calculated by keeping track of how many acknowledgement it receiver from the receiver. In receiver site the PDR can be calculated using the ratio of the number of packets the CRC with respect to the number of packets received. FIG 2. Over All System Architecture 4. RELATED WORK Jamming assault on wireless networks was usually treated from the viewpoint of human being jammers. We advocate a move toward based on the network viewpoint, and using this networked approach we show that some attractive results can be obtained. We used show that DJN can cause a stage transition in the presentation of the objective network. We employ percolation assumption to explain such phase change, to analyze the impact of DJN on the connectivity of the target network, and to give lower and upper bounds for the percolation of the objective network to come about in the presence of DJN. To providing a large scaling examination of the jamming in relation to the jammer node with density, we present simulation results recitation the impact of DJN topology on the jamming efficiency. In proposed system to demonstrated that DJN can
  • 4. International Journal of Game Theory and Technology (IJGTT), Vol.1, 2015 44 cause a phase change in target network presentation even when the total overcrowding power is held stable. We explained the stage changeover using percolation theory, analyzed scaling performance of node thickness and numeral of nodes in DJN, and we also investigate the impact of DJN topology on the overcrowding effectiveness. We believe awaiting the problem of jamming in wireless networks from a set of connections perspective can broaden the investigate scope significantly and can bring out some motivating results otherwise unachievable by focusing on person jammers. Also using we think the interaction between DJN and DWN makes for intriguing problems, which cut across system layers: device assignment, topology control, authority control, medium access, routing, and data transport. Investigating those troubles can result in deeper sympathetic of not only DJN but DWN as well. We believe a group more interesting consequences can be obtain from this move toward and are currently operational in this course. 4.1 Result analysis In this figure the nodes are created with different distance. It also sets the attacker and source, destination.
  • 5. International Journal of Game Theory and Technology (IJGTT), Vol.1, 2015 45 The attacker can hack the information. After hacking the information the source can choose the other path to receive the destination. The jammers aretaken the authenticated data. 5. CONCLUSION The Reactive Defence Mechanism it’s used to moderate the DDoS attack and additional get better system presentation in conditions of a smaller amount working out time. Supplementary the reproduction product proves it to be an enhanced result leaning approach. Secondly we need a systematic procedure for setting the parameters according to the network environment for our proposed algorithm so that it shows effective results against real proof DDoS traffics. Using the Reactive defence mechanism the data will be preventing for DDOS attack to the transmission of networks. REFERENCE [1] C. Schleher, Electronic Warfare in the Information Age. Artech House,1999. [2] D. Wood and J. A. Stankovic, “Denial of service in sensor networks,"IEEE Comput., vol. 35, no. 10, pp. 54-62, 2002. [3] J. Bellardo and S. Savage, “802.11 denial-of-service attacks: real vulnerabilities and practical solutions," in Proc. USENIX Security Symp., pp. 15-28, 2003. [4] G. Noubir and G. Lin, “Low-power DoS attacks in data wireless LANs and countermeasures," SIGMOBILE Mob. Comput. Commun. Rev., vol. 7, no. 3, pp. 29-30, 2003. [5] J. M. McCune, E. Shi, A. Perrig, andM. K. Reiter, “Detection of denialof-message attacks on sensor network broadcasts," in Proc. IEEE Symp.Security Privacy, 2005. [6] W. Xu et al., “The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. ACM Int’l. Symp. Mobile Ad Hoc Netw. Comput., 2005, pp. 46-57. [7] W. Xu, T. Wood, W. Trappe, and Y. Zhang, “Channel surfing and spatial retreats: defenses against wireless denial of service," in Proc. ACM Workshop Wireless Security, pp. 80-89, 200 [8] Q.Huang, H.Kobayashi, and B.Liu. “Modeling of distributed denialof service attacks in wireless networks,” in IEEE Pacific Rim Conf.Commun., Computers and Signal Process., vol. 1, pp. 113-127, 2003 [9] L.Sherriff, “Virus launches DDoS for mobile phones,” [Online]. Available: [10] Available: http:// www.scalable-networks.com/. [11]Available: http://news.bbc.co.uk/ [12]available: http://games.slashdot.org/