2013 IEEE International Conference on Sensing, Communications and Networking (SECON) 2013
DOI: 10.1109/sahcn.2013.6645021
|View full text |Cite
|
Sign up to set email alerts
|

How to jam without getting caught: Analysis and empirical study of stealthy periodic jamming

Abstract: Abstract-Despite the widespread commercial use of spread spectrum technology, advanced algorithms and modern hardware capabilities still allows efficient denial-of-service attacks against wireless communication systems using jamming. Much of the recent work on jamming mitigation has focused on how to adjust the transmitter-receiver system once a jamming attack has been detected. However, characterizing the detectability of certain classes of jamming attacks remains a largely unstudied problem. We aim to narrow… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…The closest work to ours is [7,8], where the authors investigate energy-optimal jamming strategies to achieve stealthiness and increase effectiveness. Specifically, DeBruhl and Tague [8] show that energy-efficient short-form periodic jamming can seriously degrade communication capabilities without compromising the jammer's activity. DeBruhl et al [7] investigate finite-energy jamming games, where jammers choose among different actions (i.e., sleep, power and channel).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The closest work to ours is [7,8], where the authors investigate energy-optimal jamming strategies to achieve stealthiness and increase effectiveness. Specifically, DeBruhl and Tague [8] show that energy-efficient short-form periodic jamming can seriously degrade communication capabilities without compromising the jammer's activity. DeBruhl et al [7] investigate finite-energy jamming games, where jammers choose among different actions (i.e., sleep, power and channel).…”
Section: Related Workmentioning
confidence: 99%
“…To understand how harmful a jammer could be, researchers have studied the worst-case jamming attack with fine-tuned temporal pattern (e.g., pulse jamming [25]), frequency-pattern (e.g., frequency-hopping jamming [26]), and so on. During the last few years, a new family of advanced jamming has gained momentum [2,7,8,15,27,28], where the target component of the jammed transmission is the main objective to optimize.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Efficient static strategies include random [40], periodic [10], and deceptive jamming [40]. Both random and periodic jamming alternate between attacking and sleeping in an attempt to attack in an efficient manner.…”
Section: Related Workmentioning
confidence: 99%
“…amples of recent energy-conscious attacks include periodic jamming [10] and random jamming [40] that alternate between jamming and sleeping to save energy; control channel jamming [8] and similar attacks that leverage protocol structure for efficiency; and reactive jamming [39], adaptive jamming [9,31], and mesh jamming [22] which respond to observed activity instead of attacking statically.…”
Section: Introductionmentioning
confidence: 99%