Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Jamming

Encyclopedia of Internet Technologies and Applications
Jamming is a simple, yet highly effective method of causing a DoS on a wireless LAN. Jamming, as the name suggests, involves the use of a device to intentionally create interfering radio signals to effectively “jam” the airwaves, resulting in the AP and any client devices being unable to transmit.
Published in Chapter:
Security Issues with Wi-Fi Networks
Kevin Curran (University of Ulster, Ireland) and Elaine Smyth (University of Ulster, Ireland)
Copyright: © 2008 |Pages: 7
DOI: 10.4018/978-1-59140-993-9.ch070
Abstract
On the surface, WLANs act the same as their wired counterparts, transporting data between network devices. However, there is one fundamental, and quite significant, difference: WLANs are based upon radio communications technology as an alternative to structured wiring and cables. Data is transmitted between devices through the air by utilizing radio waves. Devices that participate in a WLAN must have a network interface card (NIC) with wireless capabilities. This essentially means that the card contains a small radio device that allows it to communicate with other wireless devices within the defined range for that card, for example, the 2.4-2.4853 GHz range. For a device to participate in a wireless network, it must firs be permitted to communicate with the devices in that network and, second, it must be within the transmission range of the devices in that network. To communicate, radio-based devices take advantage of electromagnetic waves and their ability to be altered in such a manner that they can carry information, known as modulation (Vines, 2002). Here we discuss wireless security mechanisms.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Machine Learning Techniques to Mitigate Security Attacks in IoT
The communication channel between the nodes is compromised and occupied and jammed, thus preventing them the sensor nodes from communicating with each other.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR