2014
DOI: 10.1504/ijahuc.2014.066419
|View full text |Cite
|
Sign up to set email alerts
|

Jamming and anti-jamming techniques in wireless networks: a survey

Abstract: Because of the proliferation of wireless technologies, jamming in wireless networks has become a major research problem due to the ease in blocking communication in wireless networks. Jamming attacks are a subset of denial of service (DoS) attacks in which malicious nodes block legitimate communication by causing intentional interference in networks. To better understand this problem, we need to discuss and analyze, in detail, various techniques for jamming and anti-jamming in wireless networks. There are two … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
214
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 337 publications
(215 citation statements)
references
References 57 publications
(49 reference statements)
0
214
0
1
Order By: Relevance
“…Jamming attack is a serious threat in wireless networks, and various anti-jamming methods have been developed in recent years [1]- [8]. Due to factors of the jammers' activities, the quality of channels varies between "good" and "poor" dynamically.…”
Section: Introductionmentioning
confidence: 99%
“…Jamming attack is a serious threat in wireless networks, and various anti-jamming methods have been developed in recent years [1]- [8]. Due to factors of the jammers' activities, the quality of channels varies between "good" and "poor" dynamically.…”
Section: Introductionmentioning
confidence: 99%
“…where Pr{X SF (t)| X RP (t)} is 1 because the entire layer fails if the relay experiences a PFGE. q RP (t) is determined using (7), where f RP (t) is the probability density function (PDF) of time-to-PFGE of relay R.…”
Section: Competing Reliability Analysismentioning
confidence: 99%
“…Proof: From (15) and (17), it is noted that CRLB k,i , defined in the proposition, provides an upper bound for the problem in (15). If the conditions in (18) are satisfied, the objective function in (15) becomes equal to the upper bound, CRLB k,i , for z = z opt k,i . Therefore, if z opt k,i satisfies the distance constraints (i.e., if it is feasible for (15)), it becomes the solution of (15).…”
Section: Propositionmentioning
confidence: 99%