Game theory and reinforcement learning for anti-jamming defense in wireless communications: Current research, challenges, and solutions

L Jia, N Qi, Z Su, F Chu, S Fang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the inherently open and shared nature of the wireless channels, wireless
communication networks are vulnerable to jamming attacks, and effective anti-jamming …

Jammer localization in multi-hop wireless network: A comprehensive survey

X Wei, Q Wang, T Wang, J Fan - IEEE Communications Surveys …, 2016 - ieeexplore.ieee.org
Various security threats and corresponding countermeasures has been a major concern of
the maintainers of multi-hop wireless networks (MHWNs) in recent years. This is …

Multi-agent deep reinforcement learning for packet routing in tactical mobile sensor networks

AA Okine, N Adam, F Naeem… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Tactical wireless sensor networks (T-WSNs) are used in critical data-gathering military
operations, such as battlefield surveillance, combat monitoring, and intrusion detection …

A low power WSNs attack detection and isolation mechanism for critical smart grid applications

GS Dhunna, I Al-Anbagi - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are effective tools in many smart grid applications such as
remote monitoring, equipment fault diagnostic, wireless advanced metering infrastructure …

Detection of jamming attack using timestamp for WSN

SGH Rose, T Jayasree - Ad Hoc Networks, 2019 - Elsevier
Abstract Wireless Sensor Networks have a scattered nature, and the sensor nodes are
resource constraints which are remotely deployed. They are vulnerable to several attacks …

Online schedule randomization to mitigate timing attacks in 5G periodic URLLC communications

A Samaddar, A Easwaran - ACM Transactions on Sensor Networks, 2023 - dl.acm.org
Ultra-reliable low-latency communication (URLLC) in 5G networks is designed to support
time-critical applications such as industrial control systems (ICSs), where user equipment …

DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15. 4e TSCH networks

M Tiloca, DD Guglielmo, G Dini, G Anastasi… - ACM Transactions on …, 2018 - dl.acm.org
The MAC standard amendment IEEE 802.15. 4e is designed to meet the requirements of
industrial and critical applications. In particular, the Time Slotted Channel Hop** (TSCH) …

Strength of crowd (SOC)—Defeating a reactive jammer in IoT with decoy messages

S Sciancalepore, G Oligeri, R Di Pietro - Sensors, 2018 - mdpi.com
We propose Strength of Crowd (SoC), a distributed Internet of Things (IoT) protocol that
guarantees message broadcast from an initiator to all network nodes in the presence of …

Energy efficient and multi-hop routing for constrained wireless sensor networks

KPR Krishna, R Thirumuru - Sustainable Computing: Informatics and …, 2023 - Elsevier
Wireless sensor network (WSN) technique has advanced in several applications, however,
the environment has significant energy and security challenges. Therefore, this research …

Bittransfer: Mitigating reactive jamming in electronic warfare scenarios

S Sciancalepore, R Di Pietro - IEEE Access, 2019 - ieeexplore.ieee.org
Electronic Warfare (EW) scenarios contemplate powerful and stealthy jamming attacks, able
to disrupt any competing wireless communication in the target area. Reactive jamming …