2016
DOI: 10.1016/j.ijpe.2015.11.008
|View full text |Cite
|
Sign up to set email alerts
|

Jamming attacks on wireless networks: A taxonomic survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 107 publications
(42 citation statements)
references
References 76 publications
0
41
0
1
Order By: Relevance
“…Jamming attack [37] takes advantages of the sensitivity of the wireless medium to interferences and results in a denial of service in the network. Attacker identifies the radio frequencies used by the targeted WSN and tries to disrupt or block communications by emitting signals (unnecessary information) in the same frequencies that inhibit communication (messages transmission and/or reception) between nodes.…”
Section: The Most Known Attacksmentioning
confidence: 99%
“…Jamming attack [37] takes advantages of the sensitivity of the wireless medium to interferences and results in a denial of service in the network. Attacker identifies the radio frequencies used by the targeted WSN and tries to disrupt or block communications by emitting signals (unnecessary information) in the same frequencies that inhibit communication (messages transmission and/or reception) between nodes.…”
Section: The Most Known Attacksmentioning
confidence: 99%
“…A survey of techniques against DDoS attacks in Mobile Ad-hoc Network (MANETs) is presented in [6]. There are also surveys or tutorials related to the general wireless security, but they only consider one specific security issue, e.g., anti-jamming techniques [9], and physical layer security [10]. Recent surveys discuss the applications of game theory for the security in computer-communication networks [11], [12].…”
Section: B Contributions Of the Papermentioning
confidence: 99%
“…Jamming attacks pose serious risks to public communication services [2], [3]. In early 1900, jamming attacks were used in military battles.…”
Section: Introductionmentioning
confidence: 99%