Detection of stealthy jamming for UAV-assisted wireless communications: An HMM-based method
Due to the high mobility, low cost and high robustness of line-of-sight (LoS) channels,
unmanned aerial vehicles (UAVs) have begun to play an important role in assisting wireless …
unmanned aerial vehicles (UAVs) have begun to play an important role in assisting wireless …
A countermeasure against random pulse jamming in time domain based on reinforcement learning
Q Zhou, Y Li, Y Niu - IEEE Access, 2020 - ieeexplore.ieee.org
Pulse jamming is one of the common malicious jamming patterns that can significantly
reduce the of wireless communication's reliability. This paper investigates the problem of …
reduce the of wireless communication's reliability. This paper investigates the problem of …
Advanced protocols for the mitigation of friendly jamming in mobile ad-hoc networks
J Kim, PK Biswas, S Bohacek, SJ Mackey… - Journal of Network and …, 2021 - Elsevier
Abstract Mobile Ad-hoc Networks (MANETs) play a critical role for wireless communications
within mission-critical applications. Wireless communications have the drawback of being …
within mission-critical applications. Wireless communications have the drawback of being …
Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming
The openness of wireless communication and the recent development of software-defined
radio technology, respectively, provide a low barrier and a wide range of capabilities for …
radio technology, respectively, provide a low barrier and a wide range of capabilities for …
Jam sessions: Analysis and experimental evaluation of advanced jamming attacks in MIMO networks
L Zhang, F Restuccia, T Melodia… - Proceedings of the …, 2019 - dl.acm.org
Recent research advances in wireless security have shown that advanced jamming can
significantly decrease the performance of wireless communications. In advanced jamming …
significantly decrease the performance of wireless communications. In advanced jamming …
Digital radio signal cancellation attacks: An experimental evaluation
Attacker models are the cornerstone of any security assessment. As attacker's capabilities
evolve over time, it is key to re-evaluate periodically if attacker models that were deemed …
evolve over time, it is key to re-evaluate periodically if attacker models that were deemed …
Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach
Towards securing wireless networks and ensuring their dependability under jamming
attacks, this paper presents and analyzes game-theoretic formulations between an …
attacks, this paper presents and analyzes game-theoretic formulations between an …
Protecting platoons from stealthy jamming attack
Connected vehicles of a platoon broadcast basic safety messages (BSMs) over the control
channel of dedicated short-range communication (DSRC). Nevertheless, the fixed frequency …
channel of dedicated short-range communication (DSRC). Nevertheless, the fixed frequency …
Dynamic game-theoretic defense approach against stealthy jamming attacks in wireless networks
This paper develops a game-theoretic defense approach against jamming attacks targeting
access points in a wireless network. We formulate a two-player zero-sum stochastic game …
access points in a wireless network. We formulate a two-player zero-sum stochastic game …
Friendly-Jamming-Aware Routing Protocols for Tactical Networks
MANETs will play a critical role for communication in future battlefields. However, wireless
communications, especially MANETs are susceptible to jamming. While MANETs will adapt …
communications, especially MANETs are susceptible to jamming. While MANETs will adapt …