A jamming attack detection technique for opportunistic networks
Opportunistic networks (OppNets) are dispersed in nature, with nodes acting as resource
restrictions, with intermittent connectivity. These nodes are subject to various types of …
restrictions, with intermittent connectivity. These nodes are subject to various types of …
Detection of jamming attack using timestamp for WSN
SGH Rose, T Jayasree - Ad Hoc Networks, 2019 - Elsevier
Abstract Wireless Sensor Networks have a scattered nature, and the sensor nodes are
resource constraints which are remotely deployed. They are vulnerable to several attacks …
resource constraints which are remotely deployed. They are vulnerable to several attacks …
Time series analysis for jamming attack detection in wireless networks
Due to the open nature of wireless communication medium, wireless networks are
susceptible to jamming attacks. Jammers interfere with the legitimate nodes by sending …
susceptible to jamming attacks. Jammers interfere with the legitimate nodes by sending …
An Improved CSMA/CA Protocol Anti-Jamming Method Based on Reinforcement Learning
Z Ming, X Liu, X Yang, M Wang - Electronics, 2023 - mdpi.com
The CSMA/CA algorithm uses the binary backoff mechanism to solve the multi-user channel
access problem, but this mechanism is vulnerable to jamming attacks. Existing research …
access problem, but this mechanism is vulnerable to jamming attacks. Existing research …
[HTML][HTML] Developing novel low complexity models using received in-phase and quadrature-phase samples for interference detection and classification in Wireless …
GD O'Mahony, KG McCarthy, PJ Harris, CC Murphy - Ad Hoc Networks, 2021 - Elsevier
Abstract Despite Wireless Sensor Networks (WSNs) significantly developing over the past
decade, these networks, like most wireless networks, remain susceptible to malicious …
decade, these networks, like most wireless networks, remain susceptible to malicious …
Transmission early-stopping scheme for anti-jamming over delay-sensitive IoT applications
RD Halloush - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Time-critical, wireless Internet of Things applications have been drawing increasing
attention lately. The most characterizing feature of such applications is that a packet has to …
attention lately. The most characterizing feature of such applications is that a packet has to …
Joint space-time sparsity based jamming detection for mission-critical mMTC networks
SD Wang, HM Wang, Z Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
For mission-critical massive machine-type communications (mMTC) applications, the
messages are required to be delivered in real-time. However, due to the weak security …
messages are required to be delivered in real-time. However, due to the weak security …
Fast Detection of Burst Jamming for Delay-Sensitive Internet-of-Things Applications
In this paper, we investigate the design of a burst jamming detection method for delay-
sensitive Internet-of-Things (IoT) applications. In order to obtain a timely detection of burst …
sensitive Internet-of-Things (IoT) applications. In order to obtain a timely detection of burst …
Joint low-rank factor and sparsity for detecting access jamming in massive MTC networks
SD Wang, HM Wang, C Feng… - GLOBECOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Due to the weak security protection capabilities of the low-cost and low-complexity massive
access of machine-type devices, massive machine-type communications (mMTC) networks …
access of machine-type devices, massive machine-type communications (mMTC) networks …
Two-Stage Jamming Detection and Channel Estimation for UAV-based IoT Systems
This work proposes an efficient two-stage jamming detection and channel estimation
algorithm for orthogonal frequency division multiplexing (OFDM)-based unmanned aerial …
algorithm for orthogonal frequency division multiplexing (OFDM)-based unmanned aerial …