2017
DOI: 10.1109/tdsc.2015.2501288
|View full text |Cite
|
Sign up to set email alerts
|

Learning-Based Jamming Attack against Low-Duty-Cycle Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 33 publications
0
7
0
Order By: Relevance
“…Recent studies have shown interest on optimizing the EE of jamming attacker [3], [4]. Whereas optimal attacking strategies for hybrid attacker are designed in [5], [6] to achieve maximum degradation in the secrecy rate, however EE aspect has been neglected.…”
Section: Introductionmentioning
confidence: 99%
“…Recent studies have shown interest on optimizing the EE of jamming attacker [3], [4]. Whereas optimal attacking strategies for hybrid attacker are designed in [5], [6] to achieve maximum degradation in the secrecy rate, however EE aspect has been neglected.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, Namboodiri et al have pointed out how a jammer can temporarily/permanently connect or disconnect AMI messages by spoofing packets [101]. For WSNs, Yang et al [102] proposed a novel attack called "learning-based jamming (LearJam)". The LearJam has two-phase design: (i) learning phase, and (ii) attacking phase.…”
Section: E Denial Of Servicementioning
confidence: 99%
“…Wireless communication networks for the smart metering network are potentially exposed to jamming threats. Several literature pointed out that jamming attacks pose constant DoS threat to smart grid applications [148], [102].…”
Section: Boc Substation Management ----mentioning
confidence: 99%
“…Researchers have investigated security issues on various kinds of cyber attacks for closed-loop general CPSs. Typical cyber attacks on CPS include Denial-of-Service attacks (DoS) [ 13 , 14 , 15 ], replay attacks [ 16 , 17 ], data injection/integrity attacks [ 18 , 19 ], deception attacks [ 20 ], and so on.…”
Section: Cyber-physical Systems Securitymentioning
confidence: 99%
“…A DoS attacker can prevent the communications between physical elements and cyber elements in a CPS. For example, the cyber attacker can jam the wireless communication channel to degrade the packet reception rate [ 13 ]. Zhang et al .…”
Section: Cyber-physical Systems Securitymentioning
confidence: 99%