Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks.
Sudip MisraSanjay K. DhurandherAvanish RayankulaDeepansh AgrawalPublished in: Comput. Electr. Eng. (2010)
Keyphrases
- access points
- network infrastructure
- network connectivity
- wireless medium
- cellular networks
- wireless technologies
- access network
- wireless networks
- network security
- wired networks
- mobile devices
- wireless communication
- cognitive radio
- social networks
- end hosts
- ddos attacks
- mobile users
- defense mechanisms
- mobile nodes
- ad hoc networks
- mobile wireless
- traffic analysis
- countermeasures
- mobile phone
- intrusion detection
- multi hop
- complex networks
- anomaly detection
- computer networks
- internet access
- wireless internet
- security mechanisms
- network design