Today’s trend of migrating radio devices from hardware to software provides potentials to create flexible applications for both commercial and military use. However, this raises security concerns, as malicious attacks can also be alleviated to break legitimate communications. In this research work, we study and build practical systems to mitigate the impact of some serious jamming threats: high-power jamming, rate-based attacks, and jamming in multicarrier systems. First, we develop SAIM – a hybrid system of mixed mechanical steerable antenna and software jamming cancellation – to counter high-power jamming adversary. The system robustness relies on a new antenna structure we specially design for anti-jamming purpose, and a set of new algor...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Abstract—Reactive jamming is considered the most powerful jamming attack as the attack efficiency is...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
Abstract Today's trend of migrating radio devices from hardware to software provides potential ...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
A major challenge in securing wireless applications and services is the inherent vulnerability of ra...
Over time, the use of wireless technologies has significantly increased due to bandwidth improvement...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
Rapid development in the field of wireless technologies makes the wireless systems feasible for high...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
International audienceWith the great expansion of wireless communications, jamming becomes a real th...
Conventional techniques currently used for secure communications are subject to significant vulnerab...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Abstract—Reactive jamming is considered the most powerful jamming attack as the attack efficiency is...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
Abstract Today's trend of migrating radio devices from hardware to software provides potential ...
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, ye...
A major challenge in securing wireless applications and services is the inherent vulnerability of ra...
Over time, the use of wireless technologies has significantly increased due to bandwidth improvement...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
Rapid development in the field of wireless technologies makes the wireless systems feasible for high...
Dense, unmanaged 802.11 deployments tempt sabo- teurs into launching jamming attacks by injecting ma...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
International audienceWith the great expansion of wireless communications, jamming becomes a real th...
Conventional techniques currently used for secure communications are subject to significant vulnerab...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious as...
Abstract—Reactive jamming is considered the most powerful jamming attack as the attack efficiency is...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...