Jamming and anti–jamming techniques in wireless networks: a survey

K Grover, A Lim, Q Yang - International Journal of Ad Hoc …, 2014 - inderscienceonline.com
Because of the proliferation of wireless technologies, jamming in wireless networks has
become a major research problem due to the ease in blocking communication in wireless …

Optimal power allocation and scheduling under jamming attacks

S D'Oro, E Ekici, S Palazzo - IEEE/ACM Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we consider a jammed wireless scenario where a network operator aims to
schedule users to maximize network performance while guaranteeing a minimum …

Jamming-resistant collaborative broadcast using uncoordinated frequency hopping

L Xiao, H Dai, P Ning - IEEE transactions on Information …, 2011 - ieeexplore.ieee.org
We propose a jamming-resistant collaborative broadcast scheme for wireless networks,
which utilizes the Un coordinated Frequency Hopping (UFH) technique to counteract …

Performance metric analysis for a jamming detection mechanism under collaborative and cooperative schemes in industrial wireless sensor networks

A Cortés-Leal, C Del-Valle-Soto, C Cardenas… - Sensors, 2021 - mdpi.com
The emergence of Industry 4.0 technologies, such as the Internet of Things (IoT) and
Wireless Sensor Networks (WSN), has prompted a reconsideration of methodologies for …

A trigger identification service for defending reactive jammers in WSN

Y Xuan, Y Shen, NP Nguyen… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
During the last decade, Reactive Jamming Attack has emerged as a great security threat to
wireless sensor networks, due to its mass destruction to legitimate sensor communications …

Third eye: Context-aware detection for hidden terminal emulation attacks in cognitive radio-enabled IoT networks

M Hossain, J Xie - IEEE Transactions on Cognitive …, 2020 - ieeexplore.ieee.org
Recently, the Internet of Things (IoT) technology has been drawing increasing attention
because it has a great potential to positively impact human life in a broad range of …

Concomitant group testing

TV Bui, J Scarlett - IEEE Transactions on Information Theory, 2024 - ieeexplore.ieee.org
In this paper, we introduce a variation of the group testing problem capturing the idea that a
positive test requires a combination of multiple “types” of items. Specifically, we assume that …

A lightweight framework for secure life-logging in smart environments

NE Petroulakis, EZ Tragos, AG Fragkiadakis… - … security technical report, 2013 - Elsevier
As the world becomes an interconnected network where objects and humans interact with
each other, new challenges and threats appear in the ecosystem. In this interconnected …

Efficient and timely jamming detection in wireless sensor networks

D Liu, J Raymer, A Fox - … Conference on Mobile Ad-Hoc and …, 2012 - ieeexplore.ieee.org
Wireless communication is vulnerable to jamming attacks, where an adversary injects strong
noise to interfere with the legitimate transmissions. Jamming can easily disrupt a sensor …

On Localized Countermeasure against reactive jamming attacks in smart grid wireless mesh networks

I Shin, M Cho - Applied Sciences, 2018 - mdpi.com
Reactive jamming attacks have been considered as one of the most lethal and disruptive
threats to subvert or disrupt wireless networks since they attack the broadcast nature of …