A jamming attack detection technique for opportunistic networks

J Singh, I Woungang, SK Dhurandher, K Khalid - Internet of Things, 2022 - Elsevier
Opportunistic networks (OppNets) are dispersed in nature, with nodes acting as resource
restrictions, with intermittent connectivity. These nodes are subject to various types of …

Detection of jamming attack using timestamp for WSN

SGH Rose, T Jayasree - Ad Hoc Networks, 2019 - Elsevier
Abstract Wireless Sensor Networks have a scattered nature, and the sensor nodes are
resource constraints which are remotely deployed. They are vulnerable to several attacks …

Time series analysis for jamming attack detection in wireless networks

M Cheng, Y Ling, WB Wu - GLOBECOM 2017-2017 IEEE …, 2017 - ieeexplore.ieee.org
Due to the open nature of wireless communication medium, wireless networks are
susceptible to jamming attacks. Jammers interfere with the legitimate nodes by sending …

An Improved CSMA/CA Protocol Anti-Jamming Method Based on Reinforcement Learning

Z Ming, X Liu, X Yang, M Wang - Electronics, 2023 - mdpi.com
The CSMA/CA algorithm uses the binary backoff mechanism to solve the multi-user channel
access problem, but this mechanism is vulnerable to jamming attacks. Existing research …

[HTML][HTML] Developing novel low complexity models using received in-phase and quadrature-phase samples for interference detection and classification in Wireless …

GD O'Mahony, KG McCarthy, PJ Harris, CC Murphy - Ad Hoc Networks, 2021 - Elsevier
Abstract Despite Wireless Sensor Networks (WSNs) significantly developing over the past
decade, these networks, like most wireless networks, remain susceptible to malicious …

Transmission early-stopping scheme for anti-jamming over delay-sensitive IoT applications

RD Halloush - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Time-critical, wireless Internet of Things applications have been drawing increasing
attention lately. The most characterizing feature of such applications is that a packet has to …

Joint space-time sparsity based jamming detection for mission-critical mMTC networks

SD Wang, HM Wang, Z Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
For mission-critical massive machine-type communications (mMTC) applications, the
messages are required to be delivered in real-time. However, due to the weak security …

Fast Detection of Burst Jamming for Delay-Sensitive Internet-of-Things Applications

SD Wang, HM Wang, P Liu - IEEE Transactions on Wireless …, 2022 - ieeexplore.ieee.org
In this paper, we investigate the design of a burst jamming detection method for delay-
sensitive Internet-of-Things (IoT) applications. In order to obtain a timely detection of burst …

Joint low-rank factor and sparsity for detecting access jamming in massive MTC networks

SD Wang, HM Wang, C Feng… - GLOBECOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Due to the weak security protection capabilities of the low-cost and low-complexity massive
access of machine-type devices, massive machine-type communications (mMTC) networks …

Two-Stage Jamming Detection and Channel Estimation for UAV-based IoT Systems

T Assaf, M Al-Jarrah, A Al-Dweik, Z Ding, E Alsusa… - Authorea …, 2024 - techrxiv.org
This work proposes an efficient two-stage jamming detection and channel estimation
algorithm for orthogonal frequency division multiplexing (OFDM)-based unmanned aerial …