In this work, we take on the role of a wireless adversary and investigate one of its most powerful tools---radio frequency jamming. Although different jammer designs are discussed …
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such …
With the now widespread availability of software-defined radio technology for wireless networks, the distinction between jamming in the original electronic warfare sense and …
S Fang, Y Liu, P Ning - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
A reactive jammer jams wireless channels only when target devices are transmitting; Compared to constant jamming, reactive jamming is harder to track and compensate against …
K Grover, A Lim, Q Yang - International Journal of Ad Hoc …, 2014 - inderscienceonline.com
Because of the proliferation of wireless technologies, jamming in wireless networks has become a major research problem due to the ease in blocking communication in wireless …
J Xu, L Duan, R Zhang - IEEE Wireless Communications, 2017 - ieeexplore.ieee.org
Conventional wireless security assumes wireless communications are legitimate, and aims to protect them against malicious eavesdropping and jamming attacks. However, emerging …
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary …
Reactive jammers have been shown to be a serious threat for wireless communication. Despite this, it is difficult to detect their presence reliably. We propose a novel method to …
ZigBee is a wireless communication technology that has been widely used to provide low- bandwidth wireless services for Internet-of-Things applications, such as building automation …