![]() The jamming technique presented by at the end 2014 outlined both constant and selective jamming. This error correcting process turns out to be the key to technique as it provides time for the attack hardware to decide if it’s going to jam the ACK or not. It basically says: “yep, I got that data frame and it checks out”. The WiFi protocol specifies an Acknowledgement Frame (ACK) which is sent by the receiving device after error correction has been performed. found an interesting tweak to previous research that allows an Atheros WiFi card to jam WiFi by obscuring ACK frames. Here’s a particularly interesting example because the proof of concept shows that you don’t need specialized hardware to pull it off. As we fill our airwaves with more and more wirelessly connected devices the question of what could disrupt this systems becomes more and more important.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |