2016 IEEE Conference on Communications and Network Security (CNS) 2016
DOI: 10.1109/cns.2016.7860477
|View full text |Cite
|
Sign up to set email alerts
|

Rolling preambles: Mitigating stealthy FO estimation attacks in OFDM-based 802.11 systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…A PHY layer technique was developed in ref. [15] to mitigate the intelligent IEEE 802.11 reactive jammer that targeted the parts of the preamble used in CFO estimation [28]. Techniques included cyclically shifting the short sequence in time, randomly selecting a different sequence out of 4 static options, or changing the sequence repetitions used by the receiver for estimation.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A PHY layer technique was developed in ref. [15] to mitigate the intelligent IEEE 802.11 reactive jammer that targeted the parts of the preamble used in CFO estimation [28]. Techniques included cyclically shifting the short sequence in time, randomly selecting a different sequence out of 4 static options, or changing the sequence repetitions used by the receiver for estimation.…”
Section: Related Workmentioning
confidence: 99%
“…In all of the aforementioned studies, analysis was limited to simulation and would benefit from experimental evaluation to provide a greater sense of realism to the communication devices considered. Hardware-based systems have focused on performing jamming mitigation primarily for lowrate hostile military applications [13,14] or for very specific jammer types [15,16]. A more generalised solution must be…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation