International audienceWith the great expansion of wireless communications, jamming becomes a real threat.We propose a new model to evaluate the robustness of a communication system to jamming. The model results in more scenarios to be considered ranging from the favorable case to the worst case. The model is applied to a TH-UWB radio. The performance of such a radio in presence of the different jamming scenarios is analyzed. We introduce a mitigation solution based on stream cipher that restricts the jamming problem of the TH-UWB communication to the more favorable case while preserving confidentiality
Jamming-resistant communication without pre-shared secrets has received extensive attention recently...
Abstract—Jamming-resistant communication is crucial for safety-critical applications such as emergen...
Over time, the use of wireless technologies has significantly increased due to bandwidth improvement...
Jamming is a major threat against wireless communications. In this paper, we evaluate the effect of ...
A major challenge in securing wireless applications and services is the inherent vulnerability of ra...
Today’s trend of migrating radio devices from hardware to software provides potentials to create fle...
Due to the shared nature of wireless medium, wireless communications are more vulnerable to security...
As the number of connected devices and the importance of mobile communications continue to increase,...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Abstract- In this paper, we introduce spread spectrum links that can be used to overcome intentional...
Abstract-Wireless communication systems are often susceptible to the jamming attack where adversarie...
In this paper, we study strategies for allocating and man-aging friendly jammers, so as to create vi...
Jamming attacks can significantly impact the performance of wireless communication systems. In addit...
One of the primary advantages of spread spectrum communication is its resistance to interference and...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...
Jamming-resistant communication without pre-shared secrets has received extensive attention recently...
Abstract—Jamming-resistant communication is crucial for safety-critical applications such as emergen...
Over time, the use of wireless technologies has significantly increased due to bandwidth improvement...
Jamming is a major threat against wireless communications. In this paper, we evaluate the effect of ...
A major challenge in securing wireless applications and services is the inherent vulnerability of ra...
Today’s trend of migrating radio devices from hardware to software provides potentials to create fle...
Due to the shared nature of wireless medium, wireless communications are more vulnerable to security...
As the number of connected devices and the importance of mobile communications continue to increase,...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Abstract- In this paper, we introduce spread spectrum links that can be used to overcome intentional...
Abstract-Wireless communication systems are often susceptible to the jamming attack where adversarie...
In this paper, we study strategies for allocating and man-aging friendly jammers, so as to create vi...
Jamming attacks can significantly impact the performance of wireless communication systems. In addit...
One of the primary advantages of spread spectrum communication is its resistance to interference and...
Abstract—802.11a, b, and g standards were designed for deployment in cooperative environments, and h...
Jamming-resistant communication without pre-shared secrets has received extensive attention recently...
Abstract—Jamming-resistant communication is crucial for safety-critical applications such as emergen...
Over time, the use of wireless technologies has significantly increased due to bandwidth improvement...