On jamming against wireless networks

SD Amuru, HS Dhillon… - … transactions on wireless …, 2016 - ieeexplore.ieee.org
… on a victim receiver. In this paper, we study jamming attacks against wireless networks. …
attack is analyzed from the perspective of a victim receiver that is accessing this wireless network

Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
… Preamble warping attack [53], [54] designed to disable the STF-based auto-correlation
synchronization at a Wi-Fi receiver by transmitting the jamming signal on the subcarriers where …

Selective jamming attacks in wireless networks

A Proano, L Lazos - 2010 IEEE International Conference on …, 2010 - ieeexplore.ieee.org
… of network protocols at various layers of the protocol stack. We illustrate the impact of selective
jamming on the network … , and in proximity to the targeted receivers [15]. For an adversary …

Jamming and anti–jamming techniques in wireless networks: a survey

K Grover, A Lim, Q Yang - International Journal of Ad Hoc …, 2014 - inderscienceonline.com
… Then, receivers jam the transmitted signal by flipping certain … of jamming and anti-jamming
for all types of wireless networks… the anti-jamming protocols only for wireless sensor networks. …

The feasibility of launching and detecting jamming attacks in wireless networks

W Xu, W Trappe, Y Zhang, T Wood - … on Mobile ad hoc networking and …, 2005 - dl.acm.org
jamming attack models that can be used by an adversary to disable the operation of a wireless
network… We varied the source-receiver configurations as well as the location of the jammer

Jamming games in wireless networks with incomplete information

YE Sagduyu, RA Berry… - IEEE Communications …, 2011 - ieeexplore.ieee.org
Wireless networks rely on broadcast transmissions thereby increasing their vulnerability to
denial of service (DoS) attacks via jamming … transmitters with individual receivers and jammers…

Taking advantage of jamming in wireless networks: A survey

H Al-Mefleh, O Al-Kofahi - Computer Networks, 2016 - Elsevier
… for in wireless networks, and we survey different jamming-based protocols deployed for
wireless networks. … Therefore, receivers are required only to detect the presence of jam signals. …

Jamming-resistant learning in wireless networks

J Dams, M Hoefer, T Kesselheim - … Transactions on Networking, 2015 - ieeexplore.ieee.org
… and one receiver but of a sender with multiple recievers. In this case, we can guarantee the
same approximation factors when for a successful transmission either all receivers or at least …

[PDF][PDF] Intelligent jamming in wireless networks with applications to 802.11 b and other networks

D Thuente, M Acharya - Proc. of MILCOM, 2006 - Citeseer
… at the receiver. Fig. 2 illustrates the use of RTS (Request to Send) and CTS (Clear to Send).
… The RTS packet includes the receiver of the anticipated data transmission and the duration …

Short paper: Reactive jamming in wireless networks: How realistic is the threat?

M Wilhelm, I Martinovic, JB Schmitt… - … on Wireless network …, 2011 - dl.acm.org
… We measure the PRR in the presence of our reactive jammer for different positions of the
receiver; here, we consider 72 positions arranged on a grid. We transmit 100 frames per …