Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and transmission rate adaptation (RA) have been separately used to mitigate jamming. When RA is used alone, it has been shown that a jammer who randomizes its power levels can force the transmitter to always operate at the lowest rate, by maintaining the average jamming power above a certain threshold. On the other hand, when only FH is used, a high throughput overhead is incurred due to frequent channel switching. In this paper, we propose to mitigate jamming by jointly optimizing the FH and RA techniques. This way, the transmitter can escape the jammer by changing its channel, adjusting its rate, or both. We consider a power-constrained 'reactive-s...
International audienceJamming attacks have been shown to disrupt secret key generation (SKG) in syst...
Click on the DOI link to access the article (may not be free).This paper studies a jamming statistic...
We address the problem of passive eavesdroppers in multi-hop wireless networks using the technique o...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
We study the problem of jamming in a fixed-rate wireless system over fast fading channels. Both tran...
Jamming-resistant communication without pre-shared secrets has received extensive attention recently...
Uncoordinated frequency hopping (UFH) has recently emerged as an effective mechanism to defend again...
In this paper, we adopt outage probability (A- capacity) in fast fading channels as a pay-off functi...
In this article, we adopt outage probability (λ-capacity) in fastfading channels as a pay-off functi...
We consider training-based transmissions over multiple-input-multiple- output (MIMO) fading channels...
For multi-band wireless ad hoc networks of multiple users, an anti-jamming game between the users an...
We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-ac...
Abstract—Anti-jamming communication without pre-shared secrets has gained increasing research intere...
The topic of physical layer key agreement in Gaussian block fading channels in the presence of activ...
The openness of wireless communication and the recent de-velopment of software-defined radio technol...
International audienceJamming attacks have been shown to disrupt secret key generation (SKG) in syst...
Click on the DOI link to access the article (may not be free).This paper studies a jamming statistic...
We address the problem of passive eavesdroppers in multi-hop wireless networks using the technique o...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
We study the problem of jamming in a fixed-rate wireless system over fast fading channels. Both tran...
Jamming-resistant communication without pre-shared secrets has received extensive attention recently...
Uncoordinated frequency hopping (UFH) has recently emerged as an effective mechanism to defend again...
In this paper, we adopt outage probability (A- capacity) in fast fading channels as a pay-off functi...
In this article, we adopt outage probability (λ-capacity) in fastfading channels as a pay-off functi...
We consider training-based transmissions over multiple-input-multiple- output (MIMO) fading channels...
For multi-band wireless ad hoc networks of multiple users, an anti-jamming game between the users an...
We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-ac...
Abstract—Anti-jamming communication without pre-shared secrets has gained increasing research intere...
The topic of physical layer key agreement in Gaussian block fading channels in the presence of activ...
The openness of wireless communication and the recent de-velopment of software-defined radio technol...
International audienceJamming attacks have been shown to disrupt secret key generation (SKG) in syst...
Click on the DOI link to access the article (may not be free).This paper studies a jamming statistic...
We address the problem of passive eavesdroppers in multi-hop wireless networks using the technique o...