Wireless Jamming Attack
In wireless networks, jamming attacks disrupt the legitimate communication between two nodes using interference signals. As a result, a channel between a sender and a receiver is blocked.
Over the last decades, wireless communications have been used widely to exchange data between multiple devices. In a wireless communication system, both a transmitter and a receiver share critical information during the transmission time. This makes the wireless channels to be subject to challenging aspects, such as noise and interference. Additionally, there are security concerns associated with wireless communication systems due to open nature of wireless networks, and the limitation of the power and computation capability of each device. Jamming attacks aim to target the channel of wireless communication systems and to prevent both a sender and a receiver from sharing data.
A jammer aims to prevent...
- Liu A, Ning P, Dai H, Liu Y, Wang C (2010a) Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. In: Proceedings of the 26th annual computer security applications conference. ACM, pp 367–376Google Scholar
- Liu Y, Ning P, Dai H, Liu A (2010b) Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: INFOCOM, 2010 proceedings IEEE. IEEE, pp 1–9Google Scholar
- Pöpper C, Strasser M, Capkun S (2009) Jamming-resistant broadcast communication without shared keys. In: USENIX security symposium, pp 231–248Google Scholar
- Simon MK, Omura JK, Scholtz RA, Levitt BK (1994) Spread spectrum communications handbook, revised edition. McGraw-Hill, Inc., New YorkGoogle Scholar
- Strasser M, Pöpper C, Capkun S, Cagalj M (2008) Jamming-resistant key establishment using uncoordinated frequency hopping. In: Security and privacy, IEEE symposium on SP 2008. IEEE, pp 64–78Google Scholar