Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
RF-WAVEGUARD: Enhancing UAV Security Against Signal Jamming Attacks through Radio Frequency Watermarking
SaT-CPS '24: Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical SystemsPages 71–80https://doi.org/10.1145/3643650.3658612As Unmanned Aerial Vehicles (UAVs) become increasingly integral to a variety of industries, their dependency on radio frequency (RF) signal-based communication systems has exposed them to a multitude of security vulnerabilities. One of the most notable ...
- short-paperOctober 2022
An Adaptable Module for Designing Jamming Attacks in WiFi Networks for ns-3
MSWiM '22: Proceedings of the 25th International ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile SystemsPages 121–124https://doi.org/10.1145/3551659.3559059The inherent openness of wireless communication techniques has made them vulnerable to jamming attacks. However, the effectiveness of a jamming attack depends on numerous parameters and varies according to the state of the environment. At the same time, ...
- short-paperJune 2021
Intermittent Jamming against Telemetry and Telecommand of Satellite Systems and A Learning-driven Detection Strategy
WiseML '21: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine LearningPages 43–48https://doi.org/10.1145/3468218.3469041Towards sixth-generation networks (6G), satellite communication systems, especially based on Low Earth Orbit (LEO) networks, become promising due to their unique and comprehensive capabilities. These advantages are accompanied by a variety of challenges ...
- review-articleNovember 2020
Survey on cognitive anti‐jamming communications
IET Communications (CMU2), Volume 14, Issue 18Pages 3110–3127https://doi.org/10.1049/iet-com.2020.0024In this study, the authors review various jamming and anti‐jamming strategies in the context of cognitive radios (CRs). The study explores different jamming models and classifies them according to their functionality. Furthermore, a study of jamming ...
- research-articleFebruary 2021
Energy and distance evaluation for jamming attacks in wireless networks
Wireless networks are prone to jamming-type attacks due to their shared medium. An attacker node can send a radio frequency signal and if this signal interferes with the "normal" signals of two communicating nodes, the communication can be severely ...
- short-paperNovember 2019
Secure Routing in Multi-hop IoT-based Cognitive Radio Networks under Jamming Attacks
MSWIM '19: Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile SystemsPages 323–327https://doi.org/10.1145/3345768.3355944Integrating Cognitive Radio (CR) technology in Internet-of-Things (IoT) devices allows efficient large-scale deployment of IoT systems. Recently, research efforts are shifted toward adopting CR in IoT as a response for the spectrum scarcity problem. ...
- research-articleMay 2019
Jammer Detection based on Artificial Neural Networks: A Measurement Study
WiseML 2019: Proceedings of the ACM Workshop on Wireless Security and Machine LearningPages 43–48https://doi.org/10.1145/3324921.3328788Wireless networks are prone to jamming attacks due to the broadcast nature of the wireless transmission environment. The effect of jamming attacks can be further increased as the jammers can focus their signals on reference signals of the transmitters, ...
- research-articleDecember 2018
Scaling Exponential Backoff: Constant Throughput, Polylogarithmic Channel-Access Attempts, and Robustness
Journal of the ACM (JACM), Volume 66, Issue 1Article No.: 6, Pages 1–33https://doi.org/10.1145/3276769Randomized exponential backoff is a widely deployed technique for coordinating access to a shared resource. A good backoff protocol should, arguably, satisfy three natural properties: (1) it should provide constant throughput, wasting as little time as ...
- articleNovember 2015
Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks
Security and Communication Networks (SACN), Volume 8, Issue 16Pages 2635–2645https://doi.org/10.1002/sec.507Recent surges in the development of underwater acoustic networks UANs have lead to a rapid acceptance of this technology in scientific, commercial, and military applications. However, limited work has been performed on developing secure communication ...
- research-articleJanuary 2015
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 12, Issue 1Pages 31–44https://doi.org/10.1109/TDSC.2014.2316795Smart grid is a cyber-physical system that integrates power infrastructures with information technologies. To facilitate efficient information exchange, wireless networks have been proposed to be widely used in the smart grid. However, the jamming attack ...
- research-articleNovember 2013
Solution of detecting jamming attacks in vehicle ad hoc networks
MSWiM '13: Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systemsPages 405–410https://doi.org/10.1145/2507924.2507927Vehicular ad hoc network (VANET) is currently researched and achieved by several organizers to develop the intelligent transportation system (ITS). Research on Vehicular Ad hoc Network (VANET) has been conducting for long time. Nowadays, several ...
- ArticleOctober 2012
Physical-layer intrusion detection for wireless networks using compressed sensing
WIMOB '12: Proceedings of the 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)Pages 845–852https://doi.org/10.1109/WiMOB.2012.6379174The broadcast nature of wireless networks has been widely exploited by adversaries in order to cause severe denial-of-service attacks. Several algorithms are proposed in the literature for the detection and mitigation of such attacks at the physical and ...
- research-articleJuly 2012
Resource-competitive analysis: a new perspective on attack-resistant distributed computing
FOMC '12: Proceedings of the 8th International Workshop on Foundations of Mobile ComputingArticle No.: 1, Pages 1–6https://doi.org/10.1145/2335470.2335471In the spirit of competitive analysis, approximation guarantees, and game-theoretic treatments, we introduce an approach to evaluating the performance of attack-resistant algorithms in distributed systems. This new approach, which we call resource-...
- research-articleJuly 2012
Making evildoers pay: resource-competitive broadcast in sensor networks
PODC '12: Proceedings of the 2012 ACM symposium on Principles of distributed computingPages 145–154https://doi.org/10.1145/2332432.2332461Consider a time-slotted, single-hop, wireless sensor network consisting of n correct devices and and f•n Byzantine devices where f≥0 is any constant; the Byzantine devices may or may not outnumber the correct ones. There exists a trusted sender Alice ...
- articleJune 2012
A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks
Mobile Networks and Applications (MNET), Volume 17, Issue 3Pages 327–341https://doi.org/10.1007/s11036-010-0244-8In order to provide security services in wireless sensor networks, a well-known task is to provide cryptographic keys to sensor nodes prior to deployment. It is difficult to assign secret keys for all pairs of sensor node when the number of nodes is ...
- ArticleJune 2011
Video Streaming Performance in Wireless Hostile Environments
MUE '11: Proceedings of the 2011 Fifth FTRA International Conference on Multimedia and Ubiquitous EngineeringPages 267–272https://doi.org/10.1109/MUE.2011.54Wireless networks have been among the main trends during the last few years. Their low-cost deployment and ubiquitous coverage have enabled the provision of numerous services to the end-users. Wireless local area networks (WLANs) are capable of ...
- research-articleJune 2011
Conflict on a communication channel
PODC '11: Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computingPages 277–286https://doi.org/10.1145/1993806.1993855Imagine that Alice wants to send a message m to Bob, and that Carol wants to prevent this. Assume there is a communication channel between Alice and Bob, but that Carol is capable of blocking this channel. Furthermore, there is a cost of S dollars to ...