A review of counter-UAS technologies for cooperative defensive teams of drones

VU Castrillo, A Manco, D Pascarella, G Gigante - Drones, 2022 - mdpi.com
In recent years, the drone market has had a significant expansion, with applications in
various fields (surveillance, rescue operations, intelligent logistics, environmental …

Smart jamming attacks in 5G new radio: A review

Y Arjoune, S Faruque - 2020 10th annual computing and …, 2020 - ieeexplore.ieee.org
The fifth generation of wireless cellular networks (5G) is expected to be the infrastructure for
emergency services, natural disasters rescue, public safety, and military communications …

Jamming of UAV remote control systems using software defined radio

K Pärlin, MM Alam, Y Le Moullec - … International Conference on …, 2018 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have become widely available and their potential
unlawful usage introduces new security risks. It has therefore become highly desirable to …

[PDF][PDF] Detection and Classification of Radio Frequency Jamming Attacks using Machine learning.

GS Kasturi, A Jain, J Singh - J. Wirel. Mob. Networks Ubiquitous Comput …, 2020 - isyou.info
Wireless networks are an important aspect of communication technologies that avoid the
cost and burden of cable installation. They play a vital role in our everyday lives. However …

DoS attacks on remote state estimation with asymmetric information

K Ding, X Ren, DE Quevedo, S Dey… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we consider remote state estimation in an adversarial environment. A sensor
forwards local state estimates to a remote estimator over a vulnerable network, which may …

Sensing jamming strategy from limited observations: An imitation learning perspective

Y Fan, B Jiu, W Pu, Z Li, K Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper studies the problem of sensing mainlobe jamming strategy through interaction
samples between a frequency agile radar and a transmit/receive time-sharing jammer. We …

Optimal power allocation and scheduling under jamming attacks

S D'Oro, E Ekici, S Palazzo - IEEE/ACM Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we consider a jammed wireless scenario where a network operator aims to
schedule users to maximize network performance while guaranteeing a minimum …

AntiSense: Standard-compliant CSI obfuscation against unauthorized Wi-Fi sensing

M Cominelli, F Gringoli, RL Cigno - Computer Communications, 2022 - Elsevier
Abstract Channel State Information (CSI)-based localization with 802.11 has been proven
feasible in multiple scenarios and is becoming a serious threat to people's privacy in …

Iot phantom-delay attacks: Demystifying and exploiting iot timeout behaviors

C Fu, Q Zeng, H Chi, X Du… - 2022 52nd Annual IEEE …, 2022 - ieeexplore.ieee.org
This paper unveils a set of new attacks against Internet of Things (IoT) automation systems.
We first propose two novel IoT attack primitives: Event Message Delay and Command …

Antifragile communications

M Lichtman, MT Vondal, TC Clancy… - IEEE Systems …, 2016 - ieeexplore.ieee.org
This paper introduces the concept of antifragile communications, which we define as the
capability for a communications system to improve in performance due to a system stressor …