This letter introduces a novel idea to defend jamming attacks for wireless communications. In particular, when the jammer attacks the channel, the transmitter can leverage the jamming signals to transmit data by using ambient backscatter technique or harvest energy from the jamming signals to support its operation. To deal with the uncertainty of the jammer, we propose a reinforcement learning-based algorithm that allows the transmitter to obtain the optimal operation policy through real-time interaction processes with the attacker. The simulation results show the effectiveness of ambient backscatter in combating jammers, i.e., it enables the transmitter to transmit data even under the jamming attacks. We observe that the more power the jam...
International audienceComposed of devices with limited resources, IoT networks have several vulnerab...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
The communication reliability of wireless communication systems is threatened by malicious jammers. ...
This letter introduces a novel idea to defend jamming attacks for wireless communications. In partic...
© 2019 IEEE. With conventional anti-jamming solutions like frequency hopping or spread spectrum, leg...
With conventional anti-jamming solutions like frequency hopping or spread spectrum, legitimate trans...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
peer reviewedThis paper develops a novel framework to defeat a super-reactive jammer, one of the mos...
In this paper, we develop a framework to optimize the trade-off between radar sensing and data trans...
Unlike conventional anti-eavesdropping methods that always require additional energy or computing re...
We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-ac...
Conventional anti-jamming solutions like frequency hopping and rate adaptation that are more suitabl...
In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
International audienceComposed of devices with limited resources, IoT networks have several vulnerab...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
The communication reliability of wireless communication systems is threatened by malicious jammers. ...
This letter introduces a novel idea to defend jamming attacks for wireless communications. In partic...
© 2019 IEEE. With conventional anti-jamming solutions like frequency hopping or spread spectrum, leg...
With conventional anti-jamming solutions like frequency hopping or spread spectrum, legitimate trans...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
In this paper, we present a novel unified framework to protect multi-function wireless systems from ...
peer reviewedThis paper develops a novel framework to defeat a super-reactive jammer, one of the mos...
In this paper, we develop a framework to optimize the trade-off between radar sensing and data trans...
Unlike conventional anti-eavesdropping methods that always require additional energy or computing re...
We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-ac...
Conventional anti-jamming solutions like frequency hopping and rate adaptation that are more suitabl...
In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
International audienceComposed of devices with limited resources, IoT networks have several vulnerab...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
The communication reliability of wireless communication systems is threatened by malicious jammers. ...