Securing wireless transmissions with RIS-receiver coordination: Passive beamforming and active jamming

X Tang, X Lan, D Zhai, R Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
transmissions in the presence of a multi-antenna eavesdropper, where the legitimate receiver
actively performs full-duplex jamming to … the legitimate reception and jamming for security …

Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
jamming and/or anti-jamming attacks in wireless networks [20]–[30], [34]–[37]. In [20], the
authors surveyed the jamming … the jammer is active only when there are data transmissions in …

IRS-based wireless jamming attacks: When jammers can attack without power

B Lyu, DT Hoang, S Gong, D Niyato… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
… IRS jammer with the conventional active jamming attack, we first vary the LT’s transmit power
… that when we increase the transmit power of the conventional active jammer, the SINR at …

Selective jamming attacks in wireless networks

A Proano, L Lazos - 2010 IEEE International Conference on …, 2010 - ieeexplore.ieee.org
… is by jamming wireless transmissions [9], [11], [19], [20]. In the simplest form of jamming, the
… Compared to continuous jamming, the adversary is active for a short period of time, thus …

Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach

Q Zhu, W Saad, Z Han, HV Poor… - 2011-MILCOM 2011 …, 2011 - ieeexplore.ieee.org
… between an active malicious these advanced wireless communication techniques faces … a
jammer, is present and seeks to compromise the security of the users' wireless transmissions. …

Exploiting subcarrier agility to alleviate active jamming attacks in wireless networks

AOF Atya, A Aqil, S Singh, I Broustis… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
… Note here that by active jamming we refer to cases where there is prevalent jamming
To ensure transmissions even when sensing the jamming signal, we disable carrier sensing…

Cooperative jamming for secure transmission with both active and passive eavesdroppers

J Si, Z Cheng, Z Li, J Cheng, HM Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… when the active and passive eavesdroppers coexist in a wireless network, … jamming scheme
for secrecy transmission. In the proposed scheme, a multi-antenna jammer treats the active

Optimal jamming attacks and network defense policies in wireless sensor networks

M Li, I Koutsopoulos… - IEEE INFOCOM 2007-26th …, 2007 - ieeexplore.ieee.org
jamming transmission range and propose a intuitive heuristic … This exposes them to passive
and active attacks, which are … hand, an active attacker is involved in transmission as well. …

Jamming and anti–jamming techniques in wireless networks: a survey

K Grover, A Lim, Q Yang - International Journal of Ad Hoc …, 2014 - inderscienceonline.com
… It sleeps for a certain time of period and then becomes active for jamming before returning
… Reactive Data/ACK jammer jams the network by corrupting the transmissions of data or …

The feasibility of launching and detecting jamming attacks in wireless networks

W Xu, W Trappe, Y Zhang, T Wood - … on Mobile ad hoc networking and …, 2005 - dl.acm.org
… the jammer and a normal wireless node, the relative transmission power of the jammer and
… much from that measured for the reactive jammer scenario. Similar statements can be made …