Jamming attacks on wireless networks: A taxonomic survey

S Vadlamani, B Eksioglu, H Medal, A Nandi - International Journal of …, 2016 - Elsevier
Defense against jamming attacks has been an increasing concern for the military and
disaster response authorities. The military uses jamming attacks as a tool to attack and …

Game theory and reinforcement learning for anti-jamming defense in wireless communications: Current research, challenges, and solutions

L Jia, N Qi, Z Su, F Chu, S Fang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the inherently open and shared nature of the wireless channels, wireless
communication networks are vulnerable to jamming attacks, and effective anti-jamming …

User-centric view of jamming games in cognitive radio networks

L Xiao, J Liu, Q Li, NB Mandayam… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Jamming games between a cognitive radio enabled secondary user (SU) and a cognitive
radio enabled jammer are considered, in which end-user decision making is modeled using …

A game theoretic analysis of secret and reliable communication with active and passive adversarial modes

A Garnaev, M Baykal-Gursoy… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Secret and reliable communication presents a challenge involving a double dilemma for a
user and an adversary. One challenge for the adversary is to decide between jamming and …

Smart trash bin model design and future for smart city

JH Huh, JH Choi, K Seo - Applied sciences, 2021 - mdpi.com
The trash disposal system, using standard trash bags, has been adopted by the government
of the Republic of Korea (ROK) for more than two decades. This has caused a sanitary …

Security games with unknown adversarial strategies

A Garnaev, M Baykal-Gursoy… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
The security community has witnessed a significant increase in the number of different types
of security threats. This situation calls for the design of new techniques that can be …

Anti-jamming strategy versus a low-power jamming attack when intelligence of adversary's attack type is unknown

A Garnaev, Y Liu, W Trappe - IEEE Transactions on Signal and …, 2015 - ieeexplore.ieee.org
In this paper, we suggest a new class of anti-jamming problems where the type of
intelligence associated with ajamming attack is unknown. Specifically, we consider a …

Incorporating attack-type uncertainty into network protection

A Garnaev, M Baykal-Gursoy… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Network security against possible attacks involves making decisions under uncertainty. Not
only may one be ignorant of the place, the power, or the time of potential attacks, one may …

Prospect theoretic analysis of anti-jamming communications in cognitive radio networks

L Xiao, J Liu, Y Li, NB Mandayam… - 2014 IEEE Global …, 2014 - ieeexplore.ieee.org
An anti-jamming communication game between a cognitive radio enabled secondary user
(SU) and a cognitive radio enabled jammer is considered, in which end-user decision …

CDMA system design and capacity analysis under disguised jamming

T Song, K Zhou, T Li - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
This paper considers robust code division multiple access (CDMA) system design and
capacity analysis under disguised jamming, where the jammer generates a fake signal …