Digital filter design for jamming mitigation in 802.15. 4 communication

B DeBruhl, P Tague - 2011 Proceedings of 20th International …, 2011 - ieeexplore.ieee.org
Jamming attackers can dramatically increase attack efficiency and stealth by randomly or
periodically cycling the jamming transmission on and off, attacks respectively known as …

Short paper: Reactive jamming in wireless networks: How realistic is the threat?

M Wilhelm, I Martinovic, JB Schmitt… - Proceedings of the fourth …, 2011 - dl.acm.org
In this work, we take on the role of a wireless adversary and investigate one of its most
powerful tools---radio frequency jamming. Although different jammer designs are discussed …

Wireless communications under broadband reactive jamming attacks

S Fang, Y Liu, P Ning - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
A reactive jammer jams wireless channels only when target devices are transmitting;
Compared to constant jamming, reactive jamming is harder to track and compensate against …

BitTrickle: Defending against broadband and high-power reactive jamming attacks

Y Liu, P Ning - 2012 Proceedings IEEE INFOCOM, 2012 - ieeexplore.ieee.org
Reactive jamming is not only cost effective, but also hard to track and remove due to its
intermittent jamming behaviors. Frequency Hopping Spread Spectrum (FHSS) and Direct …

DEEJAM: Defeating energy-efficient jamming in IEEE 802.15. 4-based wireless networks

AD Wood, JA Stankovic, G Zhou - … on Sensor, Mesh and Ad Hoc …, 2007 - ieeexplore.ieee.org
Jamming is a very effective denial-of-service attack that renders most higher-layer security
mechanisms moot-yet it is often ignored in WSN design. We show that an interrupt jamming …

Joint adaptation of frequency hopping and transmission rate for anti-jamming wireless systems

MK Hanawal, MJ Abdel-Rahman… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping
(FH) and transmission rate adaptation (RA) have been separately used to mitigate jamming …

A real-time and protocol-aware reactive jamming framework built on software-defined radios

D Nguyen, C Sahin, B Shishkin, N Kandasamy… - Proceedings of the …, 2014 - dl.acm.org
This paper develops a software-defined radio (SDR) framework for real-time reactive
adversarial jamming in wireless networks. The system consists of detection and RF …

Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time

W Shen, P Ning, X He, H Dai - 2013 IEEE Symposium on …, 2013 - ieeexplore.ieee.org
This paper presents a novel mechanism, called Ally Friendly Jamming, which aims at
providing an intelligent jamming capability that can disable unauthorized (enemy) wireless …

Dynamic jamming mitigation for wireless broadcast networks

JT Chiang, YC Hu - … INFOCOM 2008-The 27th Conference on …, 2008 - ieeexplore.ieee.org
Wireless communications are inherently symmetric; that is, it takes an attacker the same
amount of power to modulate a signal as it does for a legitimate node to modulate the same …

Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …