A Communications Jamming Taxonomy

被引:70
作者
Lichtman, Marc [1 ]
Poston, Jeffrey D. [1 ]
Amuru, SaiDhiraj [1 ]
Shahriar, Chowdhury [1 ]
Clancy, T. Charles [2 ]
Buehrer, R. Michael [1 ]
Reed, Jeffrey H. [3 ]
机构
[1] Virginia Tech, Elect Engn, Blacksburg, VA 24061 USA
[2] Virginia Tech, Elect & Comp Engn, Blacksburg, VA 24061 USA
[3] Virginia Tech, Wireless, Blacksburg, VA 24061 USA
关键词
COGNITIVE RADIO; ATTACKS;
D O I
10.1109/MSP.2016.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the now widespread availability of software-defined radio technology for wireless networks, the distinction between jamming in the original electronic warfare sense and wireless cybersecurity attacks becomes hazy. A taxonomy delineates these concepts in the rapidly expanding field of wireless security, classifying communication jammers' theoretical behaviors and characteristics. © 2016 IEEE.
引用
收藏
页码:47 / 54
页数:8
相关论文
共 12 条
[1]  
Amuru S, 2014, IEEE GLOB COMM CONF, P1619, DOI 10.1109/GLOCOM.2014.7037040
[2]   Optimal Jamming using Delayed Learning [J].
Amuru, SaiDhiraj ;
Buehrer, R. Michael .
2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, :1528-1533
[3]  
[Anonymous], IEEE GLOB C SIGN INF
[4]  
[Anonymous], P IEEE INT C COMM JU
[5]  
[Anonymous], 2009, LTE-The UMTS Long Term Evolution: From Theory to Practice
[6]  
[Anonymous], 2008, 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications. CrownCom 2008
[7]  
[Anonymous], 2001, EW 101 1 COURSE ELEC
[8]   THE GAUSSIAN TEST CHANNEL WITH AN INTELLIGENT JAMMER [J].
BASAR, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (01) :152-157
[9]   Defense against primary user emulation attacks in cognitive radio networks [J].
Chen, Ruiliang ;
Park, Jung-Min ;
Reed, Jeffrey H. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) :25-37
[10]   Cognitive radio: Making software radios more personal [J].
Mitola, J ;
Maguire, GQ .
IEEE PERSONAL COMMUNICATIONS, 1999, 6 (04) :13-18