Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …

Game theory and reinforcement learning for anti-jamming defense in wireless communications: Current research, challenges, and solutions

L Jia, N Qi, Z Su, F Chu, S Fang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the inherently open and shared nature of the wireless channels, wireless
communication networks are vulnerable to jamming attacks, and effective anti-jamming …

Learning k for kNN Classification

S Zhang, X Li, M Zong, X Zhu, D Cheng - ACM Transactions on …, 2017 - dl.acm.org
The K Nearest Neighbor (kNN) method has widely been used in the applications of data
mining and machine learning due to its simple implementation and distinguished …

A statistical approach to detect jamming attacks in wireless sensor networks

O Osanaiye, AS Alfa, GP Hancke - Sensors, 2018 - mdpi.com
Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising
network solutions with a wide variety of applications in the areas of agriculture, environment …

Detection, estimation, and compensation of false data injection attack for UAVs

Y Gu, X Yu, K Guo, J Qiao, L Guo - Information Sciences, 2021 - Elsevier
The safety issues of unmanned aerial vehicles (UAVs) are ever increasing in focus due to
the vulnerability to attack. This paper investigates the safety problem for UAVs under the …

Data collection for attack detection and security measurement in mobile ad hoc networks: A survey

G Liu, Z Yan, W Pedrycz - Journal of Network and Computer Applications, 2018 - Elsevier
Abstract Mobile Ad Hoc Network (MANET) is becoming one type of major next generation
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …

Securing ZigBee communications against constant jamming attack using neural network

H Pirayesh, PK Sangdeh, H Zeng - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
ZigBee is a wireless communication technology that has been widely used to provide low-
bandwidth wireless services for Internet-of-Things applications, such as building automation …

Jammer localization in multi-hop wireless network: A comprehensive survey

X Wei, Q Wang, T Wang, J Fan - IEEE Communications Surveys …, 2016 - ieeexplore.ieee.org
Various security threats and corresponding countermeasures has been a major concern of
the maintainers of multi-hop wireless networks (MHWNs) in recent years. This is …

6G networks physical layer security using RGB visible light communications

S Soderi, R De Nicola - IEEE Access, 2021 - ieeexplore.ieee.org
Visible Light Communication (VLC) is a key technology for the sixth-generation (6G)
wireless communication thanks to the possibility of using artificial environmental lights as a …

Index modulation based frequency hop**: Anti-jamming design and analysis

Y Shi, K An, Y Li - IEEE Transactions on Vehicular Technology, 2021 - ieeexplore.ieee.org
Reactive symbol-level jammer has attracted attention due to its low energy cost and high
jamming efficiency. With the development of software-defined radio (SDR), the …