2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2022
DOI: 10.1109/host54066.2022.9840209
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Continuous Jamming Attack using Ultra-low Power RSSI Circuit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 10 publications
0
1
0
Order By: Relevance
“…The attacks against availability are orchestrated to disable the system from being able to determine the position of the target. Denial-of-service (DoS) approaches belong to this category, and the jamming attack is the one most frequently observed in the literature [100]. Jamming represents a form of DoS attack that obstructs the channel, preventing other nodes from using it to communicate.…”
Section: Availabilitymentioning
confidence: 99%
“…The attacks against availability are orchestrated to disable the system from being able to determine the position of the target. Denial-of-service (DoS) approaches belong to this category, and the jamming attack is the one most frequently observed in the literature [100]. Jamming represents a form of DoS attack that obstructs the channel, preventing other nodes from using it to communicate.…”
Section: Availabilitymentioning
confidence: 99%
“…The authors evaluated the proposed IDS under different jamming scenarios and showed that it can achieve over 10% increase in detection accuracy under certain conditions and "smart" jamming strategies. Mittal et al [3] suggest an ultra-low power received signal strength indicator (RSSI) circuit to detect constant jamming attacks in IoT networks. The proposed circuit uses a passive rectifier to convert incoming RF signal to a DC level, and a set of cascaded ultra-low power differential amplifier stages to generate the RSSI level.…”
Section: Related Workmentioning
confidence: 99%
“…The purpose of IDMEF is to define data formats and exchange procedures for sharing information of interest to intrusion detection and response systems and to the management systems that may need to interact with them. The details of the IDMEF format are described in the RFC 4765 3 . Within 7SHIELD, as the attacks detected are cyber-physical, we use IDMEFv2 to include geolocalization and information related to source, target, and assets involved.…”
Section: A Cyber-attack Detection Frameworkmentioning
confidence: 99%