2011 - MILCOM 2011 Military Communications Conference 2011
DOI: 10.1109/milcom.2011.6127635
|View full text |Cite
|
Sign up to set email alerts
|

Performance of IEEE 802.11 based WLAN devices under various jamming signals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
25
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 47 publications
(45 citation statements)
references
References 11 publications
1
25
0
Order By: Relevance
“…Previous work [12,14] have carried out similar studies on 802.11bg devices, and similar trends and observations can be expected, despite the differences in the PHY design of 802.11g and 802.11p. Nevertheless, this first step was of paramount importance because: 1) it provided an indicator of the performance of 802.11p communications under the presence of jamming that can be expected in the field experiments with the devices at hand; 2) it helped decide which jamming patterns to select for outdoor measurements; 3) it allowed us (as discussed later in Section 6.3) to discover and understand relevant features of the used 802.11p hardware that might not be clear; 4) it is the first attempt, to the best of our knowledge, to study the robustness of an 802.11p device to RF jamming.…”
Section: Jammer Effectivenesssupporting
confidence: 70%
See 2 more Smart Citations
“…Previous work [12,14] have carried out similar studies on 802.11bg devices, and similar trends and observations can be expected, despite the differences in the PHY design of 802.11g and 802.11p. Nevertheless, this first step was of paramount importance because: 1) it provided an indicator of the performance of 802.11p communications under the presence of jamming that can be expected in the field experiments with the devices at hand; 2) it helped decide which jamming patterns to select for outdoor measurements; 3) it allowed us (as discussed later in Section 6.3) to discover and understand relevant features of the used 802.11p hardware that might not be clear; 4) it is the first attempt, to the best of our knowledge, to study the robustness of an 802.11p device to RF jamming.…”
Section: Jammer Effectivenesssupporting
confidence: 70%
“…On the other hand, there is some related work on jamming at both MAC [6,21] and PHY [14] for generic 802.11 WLANs. [12] studied the vulnerabilities of 802.11b/g hardware to RF interference, which are associated to timing recovery and dynamic range selection issues.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this context, we face two issues: First, collecting training data requires effort and the existence of the jammer is mandatory. Second, there is an indeterminably large number of jamming attacks that can be obtained by changing the interference signal pattern [11], Detection accuracy achieved exclusively with training data from a particular attack. Interestingly, using only reactive jammer training data for detecting a constant jammer achieves a successful detection.…”
Section: Tuning Detection Sensitivitymentioning
confidence: 99%
“…With the proliferation of (time-critical) machine-to-machine applications in general, and safety-critical applications in vehicular ad-hoc networks (VANETs) in particular, the importance of jamming-aware communications is expected to increase in the future. In general, the impact of jamming can be alleviated by either increasing the robustness of the legitimate signal [11], [15] or by migrating the communication to a different frequency band [14]. However, many of the proposed countermeasures cannot always be applied on already existing systems and, in most cases, the only alternative is to try to detect the jammer.…”
Section: Introductionmentioning
confidence: 99%