Strength of crowd (SOC)—Defeating a reactive jammer in IoT with decoy messages

S Sciancalepore, G Oligeri, R Di Pietro - Sensors, 2018 - mdpi.com
We propose Strength of Crowd (SoC), a distributed Internet of Things (IoT) protocol that
guarantees message broadcast from an initiator to all network nodes in the presence of …

Bittransfer: Mitigating reactive jamming in electronic warfare scenarios

S Sciancalepore, R Di Pietro - IEEE Access, 2019 - ieeexplore.ieee.org
Electronic Warfare (EW) scenarios contemplate powerful and stealthy jamming attacks, able
to disrupt any competing wireless communication in the target area. Reactive jamming …

Cooperative Multi-Node Jamming Recognition Method Based on Deep Residual Network

J Shen, Y Li, Y Zhu, L Wan - Electronics, 2022 - mdpi.com
Anti-jamming is the core issue of wireless communication viability in complex
electromagnetic environments, where jamming recognition is the precondition and …

On Localized Countermeasure against reactive jamming attacks in smart grid wireless mesh networks

I Shin, M Cho - Applied Sciences, 2018 - mdpi.com
Reactive jamming attacks have been considered as one of the most lethal and disruptive
threats to subvert or disrupt wireless networks since they attack the broadcast nature of …

[PDF][PDF] A novel approach against reactive jamming attacks.

I Shin, Y Shen, Y Xuan, MT Thai… - Ad Hoc Sens. Wirel …, 2011 - researchgate.net
There exist many studies against reactive jamming attacks, however, these methods, ie
frequency hopping or channel surfing, require excessive computational capabilities on …

Applications of simulation modelling method in prevention of jamming attacks

YA Ivanova - 2022 International Conference on Information …, 2022 - ieeexplore.ieee.org
In cybersecurity the method of simulation modelling has advantages for effective prevention.
The aim of this paper is to contribute to development of techniques for cyber defense by а …

Detection of fabricated CTS packet attacks in wireless LANs

X Zou, J Deng - Quality, Reliability, Security and Robustness in …, 2012 - Springer
IEEE 802.11 standard employs the RTS/CTS handshake procedure to avoid transmission
collision and to improve network throughput. However, such an exchange may become a …

Jam-duration optimization for responsive vehicle-protection jammers

J Mietzner, P Nickel, A Meusling - 2010-MILCOM 2010 …, 2010 - ieeexplore.ieee.org
In this paper, we consider responsive communications jamming for vehicle protection
against radio-controlled improvised explosive devices (RCIEDs). Unlike barrage jamming …

Statistical and Machine Learning Based Attack Detection on Wireless IOT Networks

B Upadhyaya - 2021 - search.proquest.com
The extensive adoption of Internet of Things (IoT) technology over wide range of application
domains has led to several security issues. The major requirements for a defense system …

[引用][C] 无线网络中的干扰攻击

孙言强, 王晓东, 周兴铭 - 软件学报, 2012