A Deception Mechanism against Compromised Station Attacks in I II 802.11 Channel-Hopping Systems

We propose a deception mechanism to combat a compromised station in I II 802.11 channel hopping systems. A compromised station can follow the hopping channels and continuously attack them, since it recognizes the channel-hopping sequence. The key concept of the deception mechanism is that an access...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEICE transactions on communications 2012-01, Vol.E95.B (10)
Hauptverfasser: JEUNG, Jaemin, JEONG, Seungmyeong, LIM, JaeSung
Format: Artikel
Sprache:jpn
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 10
container_start_page
container_title IEICE transactions on communications
container_volume E95.B
creator JEUNG, Jaemin
JEONG, Seungmyeong
LIM, JaeSung
description We propose a deception mechanism to combat a compromised station in I II 802.11 channel hopping systems. A compromised station can follow the hopping channels and continuously attack them, since it recognizes the channel-hopping sequence. The key concept of the deception mechanism is that an access point notifies a new hopping seed but not to the jammer, while a deception station deceives the jammer. Simulations show that the proposed scheme increases network throughput compared to conventional channel hopping schemes when they are under compromised station attacks.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1221864963</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1221864963</sourcerecordid><originalsourceid>FETCH-proquest_miscellaneous_12218649633</originalsourceid><addsrcrecordid>eNqVjLsOgjAUQBujiUT5hzu6YCiPAiNBDQxOumvFKzZCi94y-PcS4w84neWcM2EOT6LY42EUT5njZ1x4aczFnLlE6uKHIgoyP4kdds5hgzX2VhkNe6zvUivqQDZSabJQmK5_mU4RXuFg5dfKrZX1g0BpqKCqIPWDNedQjKnG1itN3yvdwOFNFjtastlNtoTujwu22m2PRemN3-eAZE_jvca2lRrNQCceBDwVUSbC8A_1A6EWSP8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1221864963</pqid></control><display><type>article</type><title>A Deception Mechanism against Compromised Station Attacks in I II 802.11 Channel-Hopping Systems</title><source>Alma/SFX Local Collection</source><creator>JEUNG, Jaemin ; JEONG, Seungmyeong ; LIM, JaeSung</creator><creatorcontrib>JEUNG, Jaemin ; JEONG, Seungmyeong ; LIM, JaeSung</creatorcontrib><description>We propose a deception mechanism to combat a compromised station in I II 802.11 channel hopping systems. A compromised station can follow the hopping channels and continuously attack them, since it recognizes the channel-hopping sequence. The key concept of the deception mechanism is that an access point notifies a new hopping seed but not to the jammer, while a deception station deceives the jammer. Simulations show that the proposed scheme increases network throughput compared to conventional channel hopping schemes when they are under compromised station attacks.</description><identifier>ISSN: 0916-8516</identifier><identifier>EISSN: 1745-1345</identifier><language>jpn</language><subject>Channels ; Deception ; Jammers ; Networks ; Recognition ; Seeds ; Simulation ; Stations</subject><ispartof>IEICE transactions on communications, 2012-01, Vol.E95.B (10)</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>JEUNG, Jaemin</creatorcontrib><creatorcontrib>JEONG, Seungmyeong</creatorcontrib><creatorcontrib>LIM, JaeSung</creatorcontrib><title>A Deception Mechanism against Compromised Station Attacks in I II 802.11 Channel-Hopping Systems</title><title>IEICE transactions on communications</title><description>We propose a deception mechanism to combat a compromised station in I II 802.11 channel hopping systems. A compromised station can follow the hopping channels and continuously attack them, since it recognizes the channel-hopping sequence. The key concept of the deception mechanism is that an access point notifies a new hopping seed but not to the jammer, while a deception station deceives the jammer. Simulations show that the proposed scheme increases network throughput compared to conventional channel hopping schemes when they are under compromised station attacks.</description><subject>Channels</subject><subject>Deception</subject><subject>Jammers</subject><subject>Networks</subject><subject>Recognition</subject><subject>Seeds</subject><subject>Simulation</subject><subject>Stations</subject><issn>0916-8516</issn><issn>1745-1345</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNqVjLsOgjAUQBujiUT5hzu6YCiPAiNBDQxOumvFKzZCi94y-PcS4w84neWcM2EOT6LY42EUT5njZ1x4aczFnLlE6uKHIgoyP4kdds5hgzX2VhkNe6zvUivqQDZSabJQmK5_mU4RXuFg5dfKrZX1g0BpqKCqIPWDNedQjKnG1itN3yvdwOFNFjtastlNtoTujwu22m2PRemN3-eAZE_jvca2lRrNQCceBDwVUSbC8A_1A6EWSP8</recordid><startdate>20120101</startdate><enddate>20120101</enddate><creator>JEUNG, Jaemin</creator><creator>JEONG, Seungmyeong</creator><creator>LIM, JaeSung</creator><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope></search><sort><creationdate>20120101</creationdate><title>A Deception Mechanism against Compromised Station Attacks in I II 802.11 Channel-Hopping Systems</title><author>JEUNG, Jaemin ; JEONG, Seungmyeong ; LIM, JaeSung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_miscellaneous_12218649633</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>jpn</language><creationdate>2012</creationdate><topic>Channels</topic><topic>Deception</topic><topic>Jammers</topic><topic>Networks</topic><topic>Recognition</topic><topic>Seeds</topic><topic>Simulation</topic><topic>Stations</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>JEUNG, Jaemin</creatorcontrib><creatorcontrib>JEONG, Seungmyeong</creatorcontrib><creatorcontrib>LIM, JaeSung</creatorcontrib><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEICE transactions on communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>JEUNG, Jaemin</au><au>JEONG, Seungmyeong</au><au>LIM, JaeSung</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Deception Mechanism against Compromised Station Attacks in I II 802.11 Channel-Hopping Systems</atitle><jtitle>IEICE transactions on communications</jtitle><date>2012-01-01</date><risdate>2012</risdate><volume>E95.B</volume><issue>10</issue><issn>0916-8516</issn><eissn>1745-1345</eissn><abstract>We propose a deception mechanism to combat a compromised station in I II 802.11 channel hopping systems. A compromised station can follow the hopping channels and continuously attack them, since it recognizes the channel-hopping sequence. The key concept of the deception mechanism is that an access point notifies a new hopping seed but not to the jammer, while a deception station deceives the jammer. Simulations show that the proposed scheme increases network throughput compared to conventional channel hopping schemes when they are under compromised station attacks.</abstract></addata></record>
fulltext fulltext
identifier ISSN: 0916-8516
ispartof IEICE transactions on communications, 2012-01, Vol.E95.B (10)
issn 0916-8516
1745-1345
language jpn
recordid cdi_proquest_miscellaneous_1221864963
source Alma/SFX Local Collection
subjects Channels
Deception
Jammers
Networks
Recognition
Seeds
Simulation
Stations
title A Deception Mechanism against Compromised Station Attacks in I II 802.11 Channel-Hopping Systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T01%3A34%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Deception%20Mechanism%20against%20Compromised%20Station%20Attacks%20in%20I%20II%20802.11%20Channel-Hopping%20Systems&rft.jtitle=IEICE%20transactions%20on%20communications&rft.au=JEUNG,%20Jaemin&rft.date=2012-01-01&rft.volume=E95.B&rft.issue=10&rft.issn=0916-8516&rft.eissn=1745-1345&rft_id=info:doi/&rft_dat=%3Cproquest%3E1221864963%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1221864963&rft_id=info:pmid/&rfr_iscdi=true