An Overview of Methods of Reducing the Effect of Jamming Attacks at the Physical Layer of Wireless Networks

  • Dimitriya MihaylovaEmail author
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 283)


Jamming as a form of denial-of-service is a commonly-used attack initiated against security at the physical layer of a wireless system. This paper starts with an overview of various types of jamming and measures for its detection. Then, a number of methods for jamming mitigation that can be used at the physical layer are discussed and compared according to their main advantages and drawbacks.


Jamming Denial-of-Service Physical layer security 



The paper is published with the support of the project No BG05M2OP001-2.009-0033 “Promotion of Contemporary Research Through Creation of Scientific and Innovative Environment to Encourage Young Researchers in Technical University - Sofia and The National Railway Infrastructure Company in The Field of Engineering Science and Technology Development” within the Intelligent Growth Science and Education Operational Programme co-funded by the European Structural and Investment Funds of the European Union.


  1. 1.
    Wu, Y., Schober, R., Ng, D.W.K., Xiao, C., Caire, G.: Secure massive MIMO transmission with an active eavesdropper. IEEE Trans. Inf. Theory 62(7), 3880–3900 (2016)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Bash, B.A., Goeckel, D., Towsley, D., Guha, S.: Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12), 26–31 (2015)CrossRefGoogle Scholar
  3. 3.
    Basciftci, Y.O., Koksal, C.E., Ashikhmin, A.: Securing massive MIMO at the physical layer. In: 2015 IEEE Conference on Communications and Network Security (CNS), Florence, pp. 272–280 (2015)Google Scholar
  4. 4.
    Miller, R., Trappe, W.: On the vulnerabilities of CSI in MIMO wireless communication systems. IEEE Trans. Mob. Comput. 11(8), 1386–1398 (2012)CrossRefGoogle Scholar
  5. 5.
    Pirzadeh, H., Razavizadeh, S.M., Björnson, E.: Subverting massive MIMO by smart jamming. IEEE Wirel. Commun. Lett. 5(1), 20–23 (2016)CrossRefGoogle Scholar
  6. 6.
    Sinha, P., Jha, Rai, A.K., Bhushan, B.: Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: a survey. In: 2017 International Conference on Signal Processing and Communication (ICSPC), Coimbatore, pp. 288–293 (2017)Google Scholar
  7. 7.
    Amin, Y.M., Abdel-Hamid, A.T.: Classification and analysis of IEEE 802.15.4 PHY layer attacks. In: 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT), Cairo, pp. 1–8 (2016)Google Scholar
  8. 8.
    Muraleedharan, R., Osadciw, L.: Jamming attack detection and countermeasures in wireless sensor network using ant system. In: 2006 SPIE Symposium on Defense and Security, April 2006 (2006)Google Scholar
  9. 9.
    Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys Tutorials 11(4), 42–56 (2009). Fourth QuarterCrossRefGoogle Scholar
  10. 10.
    Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727–1765 (2016)CrossRefGoogle Scholar
  11. 11.
    O’Flynn, C.P.: Message denial and alteration on IEEE 802.15.4 low-power radio networks. In: 2011 4th IFIP International Conference on New Technologies, Mobility and Security, Paris, pp. 1–5 (2011)Google Scholar
  12. 12.
    Jokar, P., Nicanfar, H., Leung, V.C.M.: Specification-based Intrusion Detection for home area networks in smart grids. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), Brussels, pp. 208–213 (2011)Google Scholar
  13. 13.
    Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.V.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13(2), 245–257 (2011). Second QuarterCrossRefGoogle Scholar
  14. 14.
    Wood, A.D., Stankovic, J.A., Zhou, G.: DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Diego, CA, pp. 60–69 (2007)Google Scholar
  15. 15.
    Wood, A.D., Stankovic, J.A., Son, S.H.: JAM: a jammed-area mapping service for sensor networks. In: 24th IEEE Real-Time Systems Symposium, RTSS 2003, Cancun, Mexico, pp. 286–297 (2003)Google Scholar
  16. 16.
    Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 2004 ACM Workshop on Wireless Security (WiSe), NY, USA, pp. 80–89 (2004)Google Scholar
  17. 17.
    Vadlamani, S., Eksioglu, B., Medal, H., Nandi, A.: Jamming attacks on wireless networks: a taxonomic survey. Int. J. Prod. Econ. 172, 76–94 (2016)CrossRefGoogle Scholar
  18. 18.
    Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using channel hopping to increase 802.11 resilience to jamming attacks. In: IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, Barcelona, pp. 2526–2530 (2007)Google Scholar
  19. 19.
    Bloch, M., Barros, J.: Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, Cambridge (2011)CrossRefGoogle Scholar
  20. 20.
    Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: IEEE INFOCOM, pp. 1–9 (2010)Google Scholar
  21. 21.
    Do, T.T., Björnson, E., Larsson, E.G.: Jamming resistant receivers for massive MIMO. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, pp. 3619–3623 (2017)Google Scholar
  22. 22.
    Peel, C.B., Hochwald, B.M., Swindlehurst, A.L.: A vector-perturbation technique for near-capacity multiantenna multiuser communication-part I: channel inversion and regularization. IEEE Trans. Commun. 53(1), 195–202 (2005)CrossRefGoogle Scholar
  23. 23.
    Zeng, H., Cao, C., Li, H., Yan, Q.: Enabling jamming-resistant communications in wireless MIMO networks. In: 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, pp. 1–9 (2017)Google Scholar
  24. 24.
    DeBruhl, B., Tague, P.: Digital filter design for jamming mitigation in 802.15.4 communication. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), Maui, HI, pp. 1–6 (2011)Google Scholar
  25. 25.
    DeBruhl, B., Tague, P.: Mitigation of periodic jamming in a spread spectrum system by adaptive filter selection. In: Proceedings of the International Symposium on Photonic and Electromagnetic Crystal Structures, pp. 431–439 (2012)Google Scholar
  26. 26.
    Nikolova, Z., Stoyanov, G., Iliev, G., Poulkov, V.: Complex coefficient IIR digital filters. In: Márquez, F.P.G. (ed.) Digital Filters, Chapter 9, April 2011, pp. 209–239. InTech (2011). ISBN: 978-953-307-190-9Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.Faculty of TelecommunicationsTechnical University of SofiaSofiaBulgaria

Personalised recommendations