A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

Denial of service attacks in wireless networks: The case of jammers

K Pelechrinis, M Iliofotou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The shared nature of the medium in wireless networks makes it easy for an adversary to
launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such …

Coping with a smart jammer in wireless networks: A Stackelberg game approach

D Yang, G Xue, J Zhang, A Richa… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Jamming defense is an important yet challenging problem. In this paper, we study the
jamming defense problem in the presence of a smart jammer, who can quickly learn the …

Jamming attacks on wireless networks: A taxonomic survey

S Vadlamani, B Eksioglu, H Medal, A Nandi - International Journal of …, 2016 - Elsevier
Defense against jamming attacks has been an increasing concern for the military and
disaster response authorities. The military uses jamming attacks as a tool to attack and …

Performance of IEEE 802.11 under jamming

E Bayraktaroglu, C King, X Liu, G Noubir… - Mobile Networks and …, 2013 - Springer
We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that
covers both channel-oblivious and channel-aware jamming. We consider two channel …

Sublogarithmic distributed MIS algorithm for sparse graphs using Nash-Williams decomposition

L Barenboim, M Elkin - Proceedings of the twenty-seventh ACM …, 2008 - dl.acm.org
We study the distributed maximal independent set (henceforth, MIS) problem on sparse
graphs. Currently, there are known algorithms with a sublogarithmic running time for this …

Wireless communication, sensing, and REM: A security perspective

HM Furqan, MSJ Solaija, H Türkmen… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
The diverse requirements of next-generation communication systems necessitate
awareness, flexibility, and intelligence as essential building blocks of future wireless …

Mitigating control-channel jamming attacks in multi-channel ad hoc networks

L Lazos, S Liu, M Krunz - Proceedings of the second ACM conference …, 2009 - dl.acm.org
We address the problem of control-channel jamming attacks in multi-channel ad hoc
networks. Deviating from the traditional view that sees jamming attacks as a physical-layer …

A jamming-resistant MAC protocol for single-hop wireless networks

B Awerbuch, A Richa, C Scheideler - Proceedings of the twenty-seventh …, 2008 - dl.acm.org
In this paper we consider the problem of designing a medium access control (MAC) protocol
for single-hop wireless networks that is provably robust against adaptive adversarial …

Packet-hiding methods for preventing selective jamming attacks

A Proano, L Lazos - IEEE Transactions on dependable and …, 2011 - ieeexplore.ieee.org
The open nature of the wireless medium leaves it vulnerable to intentional interference
attacks, typically referred to as jamming. This intentional interference with wireless …