2019
DOI: 10.1109/access.2019.2949716
|View full text |Cite
|
Sign up to set email alerts
|

Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios

Abstract: Electronic Warfare (EW) scenarios contemplate powerful and stealthy jamming attacks, able to disrupt any competing wireless communication in the target area. Reactive jamming techniques are especially suitable to this aim. Indeed, by first eavesdropping on the whole radio spectrum used for communications, and then timely injecting random noise as soon as a transmission is detected, reactive jamming represents both an effective and hard-to-detect attack tool. In such a challenging EW scenario, all the solutions… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 44 publications
(46 reference statements)
0
9
0
Order By: Relevance
“…It is seen that the HJ is more destructive when it is near the receiving node. As another benchmark, we investigate the resiliency of our proposed scheme when the HJ is powerful enough to fully jam (FJ) all available sub-channels [20]. This special case can be easily analyzed by substituting N j = N c , taking the first term of (7), and finally, substituting the resultant R key into (21).…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…It is seen that the HJ is more destructive when it is near the receiving node. As another benchmark, we investigate the resiliency of our proposed scheme when the HJ is powerful enough to fully jam (FJ) all available sub-channels [20]. This special case can be easily analyzed by substituting N j = N c , taking the first term of (7), and finally, substituting the resultant R key into (21).…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
“…This fact may limit the performance of the system. 4) The fully-jammed (FJ) scenario [20], where N j = N c ;…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the standard communications infrastructure may be affected too as the catastrophe occurs [13], thus making the task harder and putting the rescue team at a disadvantage unless it uses an emergency communication technology like a WSN [14]. Nevertheless, the effectiveness of a WSN is closely related to how the node deployment has been planned, i.e., the coverage and connectivity achieved when the sensory network is established [15], its reliability [16] and security [17]. Although nodes are usually easy to deploy, once the sensor network has been set up there is no alternative to adding new nodes or re-deploying the WSN if information needs to be gathered in different areas [18].…”
Section: Introductionmentioning
confidence: 99%