Time series analysis for jamming attack detection in wireless networks

M Cheng, Y Ling, WB Wu - GLOBECOM 2017-2017 IEEE …, 2017 - ieeexplore.ieee.org
Due to the open nature of wireless communication medium, wireless networks are
susceptible to jamming attacks. Jammers interfere with the legitimate nodes by sending …

A combined approach for distinguishing different types of jamming attacks against wireless networks

L Wang, AM Wyglinski - Proceedings of 2011 IEEE Pacific Rim …, 2011 - ieeexplore.ieee.org
In this paper, we devised a combined approach to distinguish different types of jamming
attacks against wireless networks. Based on the shared characteristics of the wireless …

Anomaly-based intrusion detection algorithms for wireless networks

AG Fragkiadakis, VA Siris, N Petroulakis - International Conference on …, 2010 - Springer
In this paper we present and evaluate anomaly-based intrusion detection algorithms for
detecting physical layer jamming attacks in wireless networks, by seeking changes in the …

The feasibility of launching and detecting jamming attacks in wireless networks

W Xu, W Trappe, Y Zhang, T Wood - … on Mobile ad hoc networking and …, 2005 - dl.acm.org
Wireless networks are built upon a shared medium that makes it easy for adversaries to
launch jamming-style attacks. These attacks can be easily accomplished by an adversary …

An improved detection method for different types of jamming attacks in wireless networks

B Yu, LY Zhang - The 2014 2nd International Conference on …, 2014 - ieeexplore.ieee.org
In this paper, a detection method is improved for different types of jamming attacks in
wireless networks. Based on the open nature of wireless networks, wireless networks are …

Statistics-based jamming detection algorithm for jamming attacks against tactical MANETs

A Marttinen, AM Wyglinski… - 2014 IEEE Military …, 2014 - ieeexplore.ieee.org
In this paper, we propose a detection approach for reactive jamming attacks in the tactical
wireless ad hoc networks. A significant weakness for all wireless communication systems is …

A new model-based method to detect radio jamming attack to wireless networks

J Ng, Z Cai, M Yu - 2015 IEEE Globecom Workshops (GC …, 2015 - ieeexplore.ieee.org
Wireless communications are subjected to radio jamming attacks due to the fact that the
transmission medium is open to any hostile attackers. In a radio jamming, an attacker can …

A novel jamming attacks detection approach based on machine learning for wireless communication

Y Arjoune, F Salahdine, MS Islam… - 2020 International …, 2020 - ieeexplore.ieee.org
Jamming attacks target a wireless network creating an unwanted denial of service. 5G is
vulnerable to these attacks despite its resilience prompted by the use of millimeter wave …

Machine learning-based rf jamming detection in wireless networks

Z Feng, C Hua - 2018 third international conference on security …, 2018 - ieeexplore.ieee.org
Due to the open and shared nature of wireless medium, wireless networks are vulnerable to
Radio Frequency (RF) jamming attacks since an attacker can easily emit an interference …

[PDF][PDF] On classifying and evaluating the effect of jamming attacks

YS Kim, H Lee - The 24th edition of the International Conference on …, 2010 - ccs.korea.ac.kr
While various wireless networks have advanced rapidly and become an indispensable
infrastructure in our network environment, jamming attacks are the common challenging …