Surveillance and intervention of infrastructure-free mobile communications: A new wireless security paradigm

J Xu, L Duan, R Zhang - IEEE Wireless Communications, 2017 - ieeexplore.ieee.org
Conventional wireless security assumes wireless communications are legitimate, and aims
to protect them against malicious eavesdropping and jamming attacks. However, emerging …

Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …

Proactive eavesdropping via cognitive jamming in fading channels

J Xu, L Duan, R Zhang - IEEE transactions on wireless …, 2017 - ieeexplore.ieee.org
To enhance the national security, there is a growing need for authorized parties to
legitimately monitor suspicious communication links for preventing intended crimes and …

Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels

J Xu, L Duan, R Zhang - IEEE Wireless Communications …, 2015 - ieeexplore.ieee.org
This letter proposes a paradigm shift in wireless security from preventing conventional
eavesdropping attacks to a new legitimate surveillance objective by studying how a …

Deep learning for launching and mitigating wireless jamming attacks

T Erpek, YE Sagduyu, Y Shi - IEEE Transactions on Cognitive …, 2018 - ieeexplore.ieee.org
An adversarial machine learning approach is introduced to launch jamming attacks on
wireless communications and a defense strategy is presented. A cognitive transmitter uses a …

“jam me if you can:” defeating jammer with deep dueling neural network architecture and ambient backscattering augmented communications

N Van Huynh, DN Nguyen, DT Hoang… - IEEE Journal on …, 2019 - ieeexplore.ieee.org
With conventional anti-jamming solutions like frequency hopping or spread spectrum,
legitimate transceivers often tend to “escape” or “hide” themselves from jammers. These …

Jamming resilient communication using MIMO interference cancellation

Q Yan, H Zeng, T Jiang, M Li, W Lou… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Jamming attack is a serious threat to the wireless communications. Reactive jamming
maximizes the attack efficiency by jamming only when the targets are communicating, which …

A communications jamming taxonomy

M Lichtman, JD Poston, SD Amuru… - IEEE Security & …, 2016 - ieeexplore.ieee.org
With the now widespread availability of software-defined radio technology for wireless
networks, the distinction between jamming in the original electronic warfare sense and …

Survey on cognitive anti‐jamming communications

MA Aref, SK Jayaweera, E Yepez - IET Communications, 2020 - Wiley Online Library
In this study, the authors review various jamming and anti‐jamming strategies in the context
of cognitive radios (CRs). The study explores different jamming models and classifies them …

Position-based jamming for enhanced wireless secrecy

JP Vilela, PC Pinto, J Barros - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Signal interference and packet collisions are typically viewed as negative factors that hinder
wireless communication networks. When security is the primary concern, signal interference …