Game theory and reinforcement learning for anti-jamming defense in wireless communications: Current research, challenges, and solutions
L Jia, N Qi, Z Su, F Chu, S Fang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the inherently open and shared nature of the wireless channels, wireless
communication networks are vulnerable to jamming attacks, and effective anti-jamming …
communication networks are vulnerable to jamming attacks, and effective anti-jamming …
Jammer localization in multi-hop wireless network: A comprehensive survey
X Wei, Q Wang, T Wang, J Fan - IEEE Communications Surveys …, 2016 - ieeexplore.ieee.org
Various security threats and corresponding countermeasures has been a major concern of
the maintainers of multi-hop wireless networks (MHWNs) in recent years. This is …
the maintainers of multi-hop wireless networks (MHWNs) in recent years. This is …
Multi-agent deep reinforcement learning for packet routing in tactical mobile sensor networks
Tactical wireless sensor networks (T-WSNs) are used in critical data-gathering military
operations, such as battlefield surveillance, combat monitoring, and intrusion detection …
operations, such as battlefield surveillance, combat monitoring, and intrusion detection …
A low power WSNs attack detection and isolation mechanism for critical smart grid applications
GS Dhunna, I Al-Anbagi - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are effective tools in many smart grid applications such as
remote monitoring, equipment fault diagnostic, wireless advanced metering infrastructure …
remote monitoring, equipment fault diagnostic, wireless advanced metering infrastructure …
Detection of jamming attack using timestamp for WSN
Abstract Wireless Sensor Networks have a scattered nature, and the sensor nodes are
resource constraints which are remotely deployed. They are vulnerable to several attacks …
resource constraints which are remotely deployed. They are vulnerable to several attacks …
Online schedule randomization to mitigate timing attacks in 5G periodic URLLC communications
Ultra-reliable low-latency communication (URLLC) in 5G networks is designed to support
time-critical applications such as industrial control systems (ICSs), where user equipment …
time-critical applications such as industrial control systems (ICSs), where user equipment …
DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15. 4e TSCH networks
The MAC standard amendment IEEE 802.15. 4e is designed to meet the requirements of
industrial and critical applications. In particular, the Time Slotted Channel Hop** (TSCH) …
industrial and critical applications. In particular, the Time Slotted Channel Hop** (TSCH) …
Strength of crowd (SOC)—Defeating a reactive jammer in IoT with decoy messages
We propose Strength of Crowd (SoC), a distributed Internet of Things (IoT) protocol that
guarantees message broadcast from an initiator to all network nodes in the presence of …
guarantees message broadcast from an initiator to all network nodes in the presence of …
Energy efficient and multi-hop routing for constrained wireless sensor networks
KPR Krishna, R Thirumuru - Sustainable Computing: Informatics and …, 2023 - Elsevier
Wireless sensor network (WSN) technique has advanced in several applications, however,
the environment has significant energy and security challenges. Therefore, this research …
the environment has significant energy and security challenges. Therefore, this research …
Bittransfer: Mitigating reactive jamming in electronic warfare scenarios
Electronic Warfare (EW) scenarios contemplate powerful and stealthy jamming attacks, able
to disrupt any competing wireless communication in the target area. Reactive jamming …
to disrupt any competing wireless communication in the target area. Reactive jamming …