DQN-based power control for IoT transmission against jamming

Y Chen, Y Li, D Xu, L Xiao - 2018 IEEE 87th vehicular …, 2018 - ieeexplore.ieee.org
Internet of Things (IoTs) have to address jammers, with goal to interrupt the communication
of the energy-constrained IoT devices and sometimes even cause denial-of-service attacks …

" Borrowing Arrows with Thatched Boats": The Art of Defeating Reactive Jammers in IoT Networks

DT Hoang, DN Nguyen, MA Alsheikh… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
In this article, we introduce a novel deception strategy inspired by the" Borrowing Arrows
with Thatched Boats" strategy, one of the most famous military tactics in history, in order to …

Jamming mitigation via hierarchical security game for IoT communications

X Tang, P Ren, Z Han - IEEE Access, 2018 - ieeexplore.ieee.org
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly
launch jamming attacks only when it detects the legitimate transmission, known as the …

IoT anti-jamming strategy using game theory and neural network

A Gouissem, K Abualsaud, E Yaacoub… - 2020 International …, 2020 - ieeexplore.ieee.org
The Internet of things (IoT) is one of the most exposed networks to attackers due to its
widespread and its heterogeneity. In such networks, jamming attacks are widely used by …

Machine learning-based jamming detection in wireless IoT networks

B Upadhyaya, S Sun, B Sikdar - 2019 IEEE VTS Asia Pacific …, 2019 - ieeexplore.ieee.org
Jamming is a well known threat to the wireless community which is becoming a crucial issue
with the rise of security-critical applications. The design of a jamming detection mechanism …

Anti-jamming RIS communications using DQN-based algorithm

PD Thanh, HTH Giang, IP Hong - IEEE Access, 2022 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are widely applied in battlefield surveillance, where the
data collection (eg target tracking or contention zone observation) employed by local sensor …

Jamming detection in IoT wireless networks: An edge-AI based approach

A Hussain, N Abughanam, J Qadir… - Proceedings of the 12th …, 2022 - dl.acm.org
Wireless enabling technologies in critical infrastructures are increasing the efficiency of
communications. In the era of 5G and beyond, more technologies will be allowed to connect …

Real-time jamming detection in wireless IoT networks

F tu Zahra, YS Bostanci, M Soyturk - IEEe Access, 2023 - ieeexplore.ieee.org
IoT-based networks are vulnerable to jamming attacks due to their large-scale deployment
and shared communication environment. Resource constraints and the low computational …

Game theory for anti-jamming strategy in multichannel slow fading IoT networks

A Gouissem, K Abualsaud, E Yaacoub… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The open nature of the wireless communication medium renders it vulnerable to jamming
attacks by malicious users. To detect their presence and to avoid such attacks, several …

“jam me if you can:” defeating jammer with deep dueling neural network architecture and ambient backscattering augmented communications

N Van Huynh, DN Nguyen, DT Hoang… - IEEE Journal on …, 2019 - ieeexplore.ieee.org
With conventional anti-jamming solutions like frequency hopping or spread spectrum,
legitimate transceivers often tend to “escape” or “hide” themselves from jammers. These …