In this work, we take on the role of a wireless adversary and investigate one of its most powerful tools---radio frequency jamming. Although different jammer designs are discussed …
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such …
With the now widespread availability of software-defined radio technology for wireless networks, the distinction between jamming in the original electronic warfare sense and …
S Fang, Y Liu, P Ning - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
A reactive jammer jams wireless channels only when target devices are transmitting; Compared to constant jamming, reactive jamming is harder to track and compensate against …
K Grover, A Lim, Q Yang - International Journal of Ad Hoc …, 2014 - inderscienceonline.com
Because of the proliferation of wireless technologies, jamming in wireless networks has become a major research problem due to the ease in blocking communication in wireless …
J Xu, L Duan, R Zhang - IEEE Wireless Communications, 2017 - ieeexplore.ieee.org
Conventional wireless security assumes wireless communications are legitimate, and aims to protect them against malicious eavesdropping and jamming attacks. However, emerging …
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary …
Reactive jammers have been shown to be a serious threat for wireless communication. Despite this, it is difficult to detect their presence reliably. We propose a novel method to …
T Erpek, YE Sagduyu, Y Shi - IEEE Transactions on Cognitive …, 2018 - ieeexplore.ieee.org
An adversarial machine learning approach is introduced to launch jamming attacks on wireless communications and a defense strategy is presented. A cognitive transmitter uses a …