Jamming attacks on wireless networks: A taxonomic survey

被引:93
作者
Vadlamani, Satish [1 ]
Eksioglu, Burak [2 ]
Medal, Hugh [1 ]
Nandi, Apurba [1 ]
机构
[1] Mississippi State Univ, Dept Ind & Syst Engn, POB 9542, Mississippi State, MS 39762 USA
[2] Clemson Univ, Dept Ind Engn, 150 Freeman Hall, Clemson, SC 29634 USA
关键词
Jamming attack; Wireless networks; Survey; Taxonomy; GAME-THEORETIC ANALYSIS; PACKET RADIO NETWORKS; JAMMER; CONNECTIVITY; SERVICE; SPREAD; BAND;
D O I
10.1016/j.ijpe.2015.11.008
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Defense against jamming attacks has been an increasing concern for the military and disaster response authorities. The military uses jamming attacks as a tool to attack and disrupt terrorist's communications, because the open nature of wireless networks makes them vulnerable to various attacks. Many studies and a few survey papers are available in the literature, but none of these papers classify the attacks or the defense strategies by the type of wireless network affected, the attacker or defender's perspective, the type of game used to model the problem, such as Bayesian game, Stackelberg game, or the type of solution methodology, such as mathematical programming model and algorithm. This paper provides a comprehensive survey and a taxonomic classification to help interested researchers find the gaps in the literature and guide them to research areas that need to be explored. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:76 / 94
页数:19
相关论文
共 109 条
[11]  
[Anonymous], 2005, P 6 ACM INT S MOB AD, DOI DOI 10.1145/1062689.1062697
[12]  
[Anonymous], 2008, AAMAS
[13]  
[Anonymous], INFOCOM 2008
[14]  
[Anonymous], P INF THEOR APPL WOR
[15]  
[Anonymous], UEEE INT SYM PERS IN
[16]  
[Anonymous], P 16 ANN C INF SCI S
[17]  
[Anonymous], MIL COMM C 2011 MILC
[18]  
[Anonymous], IEEE INT S WORLD WIR
[19]  
[Anonymous], 1991, Game Theory
[20]  
[Anonymous], P 5 ANN INT C MOB UB