In this article, we introduce a novel deception strategy inspired by the" Borrowing Arrows with Thatched Boats" strategy, one of the most famous military tactics in history, in order to …
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate transmission, known as the …
The Internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by …
Jamming is a well known threat to the wireless community which is becoming a crucial issue with the rise of security-critical applications. The design of a jamming detection mechanism …
Wireless sensor networks (WSNs) are widely applied in battlefield surveillance, where the data collection (eg target tracking or contention zone observation) employed by local sensor …
Wireless enabling technologies in critical infrastructures are increasing the efficiency of communications. In the era of 5G and beyond, more technologies will be allowed to connect …
F tu Zahra, YS Bostanci, M Soyturk - IEEe Access, 2023 - ieeexplore.ieee.org
IoT-based networks are vulnerable to jamming attacks due to their large-scale deployment and shared communication environment. Resource constraints and the low computational …
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by malicious users. To detect their presence and to avoid such attacks, several …
With conventional anti-jamming solutions like frequency hopping or spread spectrum, legitimate transceivers often tend to “escape” or “hide” themselves from jammers. These …