Detection of stealthy jamming for UAV-assisted wireless communications: An HMM-based method

C Zhang, L Zhang, T Mao, Z Xiao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Due to the high mobility, low cost and high robustness of line-of-sight (LoS) channels,
unmanned aerial vehicles (UAVs) have begun to play an important role in assisting wireless …

A countermeasure against random pulse jamming in time domain based on reinforcement learning

Q Zhou, Y Li, Y Niu - IEEE Access, 2020 - ieeexplore.ieee.org
Pulse jamming is one of the common malicious jamming patterns that can significantly
reduce the of wireless communication's reliability. This paper investigates the problem of …

Advanced protocols for the mitigation of friendly jamming in mobile ad-hoc networks

J Kim, PK Biswas, S Bohacek, SJ Mackey… - Journal of Network and …, 2021 - Elsevier
Abstract Mobile Ad-hoc Networks (MANETs) play a critical role for wireless communications
within mission-critical applications. Wireless communications have the drawback of being …

Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming

B DeBruhl, C Kroer, A Datta, T Sandholm… - Proceedings of the 2014 …, 2014 - dl.acm.org
The openness of wireless communication and the recent development of software-defined
radio technology, respectively, provide a low barrier and a wide range of capabilities for …

Jam sessions: Analysis and experimental evaluation of advanced jamming attacks in MIMO networks

L Zhang, F Restuccia, T Melodia… - Proceedings of the …, 2019 - dl.acm.org
Recent research advances in wireless security have shown that advanced jamming can
significantly decrease the performance of wireless communications. In advanced jamming …

Digital radio signal cancellation attacks: An experimental evaluation

D Moser, V Lenders, S Capkun - Proceedings of the 12th conference on …, 2019 - dl.acm.org
Attacker models are the cornerstone of any security assessment. As attacker's capabilities
evolve over time, it is key to re-evaluate periodically if attacker models that were deemed …

Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach

AH Anwar, G Atia, M Guirguis - Journal of Network and Computer …, 2018 - Elsevier
Towards securing wireless networks and ensuring their dependability under jamming
attacks, this paper presents and analyzes game-theoretic formulations between an …

Protecting platoons from stealthy jamming attack

Y Hu, H Shan, RG Dutta, Y Jin - 2020 Asian Hardware Oriented …, 2020 - ieeexplore.ieee.org
Connected vehicles of a platoon broadcast basic safety messages (BSMs) over the control
channel of dedicated short-range communication (DSRC). Nevertheless, the fixed frequency …

Dynamic game-theoretic defense approach against stealthy jamming attacks in wireless networks

AH Anwar, G Atia, M Guirguis - 2017 55th Annual Allerton …, 2017 - ieeexplore.ieee.org
This paper develops a game-theoretic defense approach against jamming attacks targeting
access points in a wireless network. We formulate a two-player zero-sum stochastic game …

Friendly-Jamming-Aware Routing Protocols for Tactical Networks

J Kim, S Bohacek, PK Biswas… - 2018 IEEE 37th …, 2018 - ieeexplore.ieee.org
MANETs will play a critical role for communication in future battlefields. However, wireless
communications, especially MANETs are susceptible to jamming. While MANETs will adapt …