Encyclopedia of Wireless Networks

Living Edition
| Editors: Xuemin (Sherman) Shen, Xiaodong Lin, Kuan Zhang

Wireless Jamming Attack

  • Ahmad AlagilEmail author
  • Yao Liu
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-32903-1_176-1



In wireless networks, jamming attacks disrupt the legitimate communication between two nodes using interference signals. As a result, a channel between a sender and a receiver is blocked.

Historical Background

Over the last decades, wireless communications have been used widely to exchange data between multiple devices. In a wireless communication system, both a transmitter and a receiver share critical information during the transmission time. This makes the wireless channels to be subject to challenging aspects, such as noise and interference. Additionally, there are security concerns associated with wireless communication systems due to open nature of wireless networks, and the limitation of the power and computation capability of each device. Jamming attacks aim to target the channel of wireless communication systems and to prevent both a sender and a receiver from sharing data.

A jammer aims to prevent...

This is a preview of subscription content, log in to check access.


  1. Goldsmith A (2005) Wireless communications. Cambridge University Press, New YorkCrossRefGoogle Scholar
  2. Grover K, Lim A, Yang Q (2014) Jamming and anti-jamming techniques in wireless networks: a survey. Int J Ad Hoc Ubiquitous Comput 17(4):197–215CrossRefGoogle Scholar
  3. Liu A, Ning P, Dai H, Liu Y, Wang C (2010a) Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. In: Proceedings of the 26th annual computer security applications conference. ACM, pp 367–376Google Scholar
  4. Liu Y, Ning P, Dai H, Liu A (2010b) Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: INFOCOM, 2010 proceedings IEEE. IEEE, pp 1–9Google Scholar
  5. Pöpper C, Strasser M, Capkun S (2009) Jamming-resistant broadcast communication without shared keys. In: USENIX security symposium, pp 231–248Google Scholar
  6. Simon MK, Omura JK, Scholtz RA, Levitt BK (1994) Spread spectrum communications handbook, revised edition. McGraw-Hill, Inc., New YorkGoogle Scholar
  7. Stallings W (2006) Data and computer communications, 8th edn. Prentice-Hall, Inc., Upper Saddle RiverzbMATHGoogle Scholar
  8. Strasser M, Pöpper C, Capkun S, Cagalj M (2008) Jamming-resistant key establishment using uncoordinated frequency hopping. In: Security and privacy, IEEE symposium on SP 2008. IEEE, pp 64–78Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringUniversity of South FloridaTampaUSA

Section editors and affiliations

  • Haojin Zhu
    • 1
  • Jian Shen
    • 2
  1. 1.Shanghai Jiaotong University, ChinaShanghaiChina
  2. 2.Nanjing University of Information Science & Technology, ChinaNanjingChina