2016 IEEE 84th Vehicular Technology Conference (VTC-Fall) 2016
DOI: 10.1109/vtcfall.2016.7880885
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Intelligent MAC Layer Jamming Attacks and Countermeasures in WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 25 publications
1
15
0
Order By: Relevance
“…Constrained IoT networks such as LPWAN are susceptible to various other attacks as discussed by authors in [41][42][43][44][45][46][47]. Figure 4 shows the possible attacks on IoT and LPWAN networks with constrained node environment and studies conducted by various researchers.…”
Section: Security Vulnerabilities In Lpwanmentioning
confidence: 99%
“…Constrained IoT networks such as LPWAN are susceptible to various other attacks as discussed by authors in [41][42][43][44][45][46][47]. Figure 4 shows the possible attacks on IoT and LPWAN networks with constrained node environment and studies conducted by various researchers.…”
Section: Security Vulnerabilities In Lpwanmentioning
confidence: 99%
“…Some of papers show attacks classified on pasive and active (Shahzad et al, 2017). Radio interference attack is described in Hamieh et al (2009), Nancy et al (2014) and Hamza et al (2016).…”
Section: Related Workmentioning
confidence: 99%
“…When the jammer has the ability to interpret data link layer protocols, it becomes as energy-efficient as legitimate nodes. The authors in [ 17 ] presented a comprehensive survey on different sophisticated jamming attacks based on the MAC layer. Techniques used to defeat each one of the intelligent jammers are classified based on the knowledge capacity of MAC protocol rules.…”
Section: Related Workmentioning
confidence: 99%