Explore chapters and articles related to this topic
Jamming Detection in Electromagnetic Communication with Machine Learning: A Survey and Perspective
Published in Kim Phuc Tran, Machine Learning and Probabilistic Graphical Models for Decision Support Systems, 2023
Jonathan Villain, Virginie Deniau, Christophe Gransart
The attack by jamming signals consists in intentionally emitting a signal which covers the frequency bands employed by a communication system in order to disturb the reception of a communication device. Generally, the power levels of jamming signals are similar to communication signal power levels. The jamming signals can degrade the performance of the communication networks without damaging the communication devices. Different types of jamming signals can be used27. The vast majority of commercial jammers uses a cyclic frequency-sweeping interference signal, which sweeps a frequency band [f1, f2] in a time duration T. It can be expressed as: s(t)=Acos(2π(f2−f12Tt+f1)t),0<t<T, where A is the interference signal amplitude. Here, the Wi-Fi jamming signal that we consider sweeps the [2.4 GHz, 2.5 GHz] frequency band in T = 10 µs.
Interference Excision via Time–Frequency Distributions: Applications to Global Positioning System Antijam
Published in Antonia Papandreou-Suppappola, Applications in Time-Frequency Signal Processing, 2018
Alan R. Lindsey, Liang Zhao, Moeness Amin
Jamming is a procedure that attempts to block reception of a desired signal by the intended receiver. In general terms, it is high power signal that occupies the same space, time slot or frequency spectrum as the desired signal, making reception by the intended receiver difficult or impossible. Designers of military as well as commercial communication systems have, through the years, developed numerous antijamming techniques to counter these threats. As these techniques become effective for interference removal and mitigation, jammer designers develop increasingly sophisticated signals that are difficult to mitigate. These “smart” jammers typically incorporate temporal nonstationarities or spatial diversity that complicates the identification and subsequent excision process.
A Layered Internet of Things (IoT) Security Framework: Attacks, Counter Measures and Challenges
Published in Sanjay Kumar Biswash, Sourav Kanti Addya, Cloud Network Management, 2020
Umang Garg, Preeti Mishra, R.C. Joshi
Jammers of this layer are energy inefficient when compared to physical layer jamming attacks. In this attack, attackers focus to jam data packets and ACK messages as well [123]. Jamming of data packets depends on the type of MAC protocol used in communication between nodes, in which the attacker tried to manipulate some bits of packets by interfering with communication. It is one of the fatal attacks which can block the channel by generating false packets to introduce noise in the channel. IoT is a field in which all physical devices have limited energy or power constrained so the jamming attacks can drain these resources. Regulated transmitted power and frequency hopping spread spectrum are the countermeasures for jamming attacks.
Battery draining attacks against edge computing nodes in IoT networks
Published in Cyber-Physical Systems, 2020
Ryan Smith, Daniel Palin, Philokypros P. Ioulianou, Vassilios G. Vassilakis, Siamak F. Shahandashti
Various attacks can cause smart devices to consume more energy. Krentz et al. in [20] explore three denial of sleep attacks. The first type of attack is called ‘Ding Dong Ditching’. This type of attack uses a combination of four denial of sleep attacks to try to attack a device. This increases the potential for at least one of the attacks to work and to get a positive result. The first type of attack is a jamming attack. A jamming attack causes the network to become unusable by people and can be accomplished by emitting RF signal [21]. This type of attack is called a constant jammer where the MAC layer is bypassed by constantly transmitting random bits of data through an RF signal. By constantly transmitting data the transfer does not wait for a channel to become idle and therefore, does not follow the MAC layer rules [22].
Event-triggered output feedback dissipative control of nonlinear systems under DoS attacks and actuator saturation
Published in International Journal of Systems Science, 2022
Fuqiang Li, Kang Li, Chen Peng, Lisai Gao
During the attack-active intervals , the network is jammed and thus data can not be transmitted. If the frequency and/or duration of DoS attacks can be arbitrarily large, the data communication will be blocked all the time, and thus the system runs in open-loop mode. Fortunately, there exist several techniques to mitigate jamming attacks, e.g. high-pass filtering and spreading techniques (Hu et al., 2020). These provisions can be exploited to decrease the success chance of DoS attacks aiming at limiting in practice the attack's frequency and duration.
A Comprehensive Survey on GNSS Interferences and the Application of Neural Networks for Anti-jamming
Published in IETE Journal of Research, 2021
Kambham Jacob Silva Lorraine, Madhu Ramarakula
Intentional interference: This type of interference is caused when the sources generate a signal to degrade the service internationally. Jamming, spoofing, and meaconing are the three major types of intentional interference. However, in this paper, the emphasis has been made on jamming as it is one of the major GNSS threats.