2020
DOI: 10.1145/3418210
|View full text |Cite
|
Sign up to set email alerts
|

Reactive Jamming and Attack Mitigation over Cross-Technology Communication Links

Abstract: Recently, Cross-Technology Communication (CTC), allowing the direct communication among heterogeneous devices with incompatible physical layers, has attracted much research attention. Many efficient CTC protocols have been proposed to demonstrate its promise in IoT applications. However, the applications built upon CTC will be significantly impaired when CTC suffers from malicious attacks such as jamming or sniffing. In this article, we implement a reactive jamming system, JamCloak, that can attack most existi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Once such signals are detected, the attacker rapidly responds by transmitting interference or noise over the channel. This interference overwhelms legitimate signals, rendering them unreadable or causing them to be misinterpreted by receiving devices [26]. Reactive jamming attacks often leverage the dynamic nature of wireless networks, where the attacker can effectively identify communication patterns, frequencies, and timing to disrupt transmissions [27].…”
Section: E Reactive Jamming Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Once such signals are detected, the attacker rapidly responds by transmitting interference or noise over the channel. This interference overwhelms legitimate signals, rendering them unreadable or causing them to be misinterpreted by receiving devices [26]. Reactive jamming attacks often leverage the dynamic nature of wireless networks, where the attacker can effectively identify communication patterns, frequencies, and timing to disrupt transmissions [27].…”
Section: E Reactive Jamming Attackmentioning
confidence: 99%
“…Characteristics/Features Limitations [26] Reactive Jamming Frequency hopping, random time intervals Limited effectiveness [30] Continuous Wave Jamming Continuous interference signal, signal strength modulation Continuous interference signal hinders detection [31] Reactive Jamming Dynamic power levels, spread spectrum modulation Real-time detection challenges [32] Sweep Jamming Wideband jamming, frequency agility Sweep jamming across frequencies is hard to detect.…”
Section: Ref Attackmentioning
confidence: 99%
“…Recent years have seen numerous research works on CTC between heterogenous devices, such as CTC between WiFi and ZigBee [1], [2], [8], [10], [14]- [20], between WiFi and Bluetooth [21], [22], between ZigBee and Bluetooth [23], [24], between LTE and ZigBee [25], between LoRa and ZigBee [26], between LoRa and Bluetooth [27], and between RFID and WiFi [28]. Some researchers have further analyzed other problems of the CTC system, such as attack [29], [30] and network throughput improvement [31], [32]. This paper focuses on WiFi to ZigBee CTC design, and the previous works mainly fall into two categories: physical-layer CTC and PLEM.…”
Section: Related Workmentioning
confidence: 99%
“…CTC opens a new direction which enables direct communication among heterogeneous wireless devices [58][59][60][61]. The ability to communicate with devices of different technologies avoids the unnecessary hardware cost and communication delay, compared to the indirect solutions based on a multi-radio gateway [54].…”
Section: Direct Connectionmentioning
confidence: 99%