A major challenge in securing wireless applications and services is the inherent vulnerability of radio transmissions to communication jamming Denial-of-Service (DoS) attacks. This …
H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our society, and wireless services become increasingly important as the applications of wireless …
B DeBruhl, P Tague - 2011 Proceedings of 20th International …, 2011 - ieeexplore.ieee.org
Jamming attackers can dramatically increase attack efficiency and stealth by randomly or periodically cycling the jamming transmission on and off, attacks respectively known as …
IT Aziz, SK Yadav - International Journal of Computer …, 2013 - search.proquest.com
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless …
C Han, Y Niu - KSII Transactions on Internet and Information …, 2019 - koreascience.kr
The smart jammer launches jamming attacks which degrade the transmission reliability. In this paper, smart jamming attacks based on the communication probability over different …
L Wang, AM Wyglinski - Proceedings of 2011 IEEE Pacific Rim …, 2011 - ieeexplore.ieee.org
In this paper, we devised a combined approach to distinguish different types of jamming attacks against wireless networks. Based on the shared characteristics of the wireless …
An absolute solution to selective jamming would be the encryption of transmitted packets with a static key. This is the encryption of packets with packet header. For broadcast …
M Cheng, Y Ling, WB Wu - GLOBECOM 2017-2017 IEEE …, 2017 - ieeexplore.ieee.org
Due to the open nature of wireless communication medium, wireless networks are susceptible to jamming attacks. Jammers interfere with the legitimate nodes by sending …