Skip to Content
You are currently on the new version of our website. Access the old version .

149 Results Found

  • Article
  • Open Access
122 Citations
11,602 Views
15 Pages

A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks

  • Opeyemi Osanaiye,
  • Attahiru S. Alfa and
  • Gerhard P. Hancke

24 May 2018

Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising network solutions with a wide variety of applications in the areas of agriculture, environment, healthcare and the military. Notwithstanding these promising appli...

  • Article
  • Open Access
93 Citations
4,863 Views
19 Pages

An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks

  • Muhammad Adil,
  • Mohammed Amin Almaiah,
  • Alhuseen Omar Alsayed and
  • Omar Almomani

18 April 2020

Wireless Sensor Networks (WSNs) are vulnerable to various security threats. One of the most common types of vulnerability threat is the jamming attack, where the attacker uses the same frequency signals to jam the network transmission. In this paper,...

  • Article
  • Open Access
1 Citations
1,528 Views
14 Pages

8 July 2024

In contemporary networked control systems (NCSs), ensuring robust and adaptive security measures against dynamic threats like jamming attacks is crucial. These attacks can disrupt the control signals, leading to degraded performance or even catastrop...

  • Systematic Review
  • Open Access
356 Views
44 Pages

A Systematic Review and Energy-Centric Taxonomy of Jamming Attacks and Countermeasures in Wireless Sensor Networks

  • Carlos Herrera-Loera,
  • Carolina Del-Valle-Soto,
  • Leonardo J. Valdivia,
  • Javier Vázquez-Castillo and
  • Carlos Mex-Perera

15 January 2026

Wireless Sensor Networks (WSNs) operate under strict energy constraints and are therefore highly vulnerable to radio interference, particularly jamming attacks that directly affect communication availability and network lifetime. Although jamming and...

  • Article
  • Open Access
318 Views
22 Pages

Multi-Attribute Physical-Layer Authentication Against Jamming and Battery-Depletion Attacks in LoRaWAN

  • Azita Pourghasem,
  • Raimund Kirner,
  • Athanasios Tsokanos,
  • Iosif Mporas and
  • Alexios Mylonas

8 January 2026

LoRaWAN is widely used for IoT environmental monitoring, but its lightweight security mechanisms leave the physical layer vulnerable to availability attacks such as jamming and battery-depletion. These risks are particularly critical in mission-criti...

  • Article
  • Open Access
26 Citations
5,242 Views
34 Pages

24 December 2024

The Internet of Things (IoT) contains many devices that can compute and communicate, creating large networks. Industrial Internet of Things (IIoT) represents a developed application of IoT, connecting with embedded technologies in production in indus...

  • Article
  • Open Access
8 Citations
11,300 Views
15 Pages

12 April 2010

To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it...

  • Article
  • Open Access
5 Citations
7,150 Views
26 Pages

Performance Analysis of the IEEE 802.15.4 Protocol for Smart Environments under Jamming Attacks

  • Nicolás López-Vilos,
  • Claudio Valencia-Cordero,
  • Cesar Azurdia-Meza,
  • Samuel Montejo-Sánchez and
  • Samuel Baraldi Mafra

13 June 2021

Jamming attacks in wireless sensor networks (WSNs) scenarios are detrimental to the performance of these networks and affect the security and stability of the service perceived by users. Therefore, the evaluation of the effectiveness of smart environ...

  • Article
  • Open Access
8 Citations
4,179 Views
17 Pages

22 November 2018

Reactive jamming attacks have been considered as one of the most lethal and disruptive threats to subvert or disrupt wireless networks since they attack the broadcast nature of transmission mediums by injecting interfering signals. Existing counterme...

  • Article
  • Open Access
11 Citations
2,987 Views
28 Pages

Clustering-Based Energy-Efficient Self-Healing Strategy for WSNs under Jamming Attacks

  • Nicolás López-Vilos,
  • Claudio Valencia-Cordero,
  • Richard Demo Souza and
  • Samuel Montejo-Sánchez

3 August 2023

The Internet of Things (IoT) is a key technology to interconnect the real and digital worlds, enabling the development of smart cities and services. The timely collection of data is essential for IoT services. In scenarios such as agriculture, indust...

  • Article
  • Open Access
21 Citations
7,929 Views
31 Pages

On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks

  • Carolina Del-Valle-Soto,
  • Carlos Mex-Perera,
  • Raul Monroy and
  • Juan Arturo Nolazco-Flores

27 March 2015

In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have develo...

  • Article
  • Open Access
4 Citations
2,389 Views
15 Pages

H Control for ICPS with Hybrid-Triggered Mechanism Encountering Stealthy DoS Jamming Attacks

  • Mufeng Wang,
  • Yangyang Geng,
  • Jingpei Wang,
  • Ke Liu,
  • Xin Che and
  • Qiang Wei

16 July 2022

In recent years, with the upgrading of the attack technology, stealthy DoS jamming attacks have become the primary factor to threaten the security of Industrial Cyber-Physical Systems (ICPS). Considering the complex industrial scenarios of ICPS, whic...

  • Article
  • Open Access
13 Citations
6,511 Views
26 Pages

MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks

  • Carolina Del-Valle-Soto,
  • Carlos Mex-Perera,
  • Raul Monroy and
  • Juan A. Nolazco-Flores

5 July 2017

In this work, we present the design of a mitigation scheme for jamming attacks integrated to the routing protocols MPH, AODV, and DSR. The resulting protocols are named MPH-M (Multi-Parent Hierarchical - Modified), AODV-M (Ad hoc On Demand Distance V...

  • Article
  • Open Access
739 Views
32 Pages

Evaluation of Jamming Attacks on NR-V2X Systems: Simulation and Experimental Perspectives

  • Antonio Santos da Silva,
  • Kevin Herman Muraro Gularte,
  • Giovanni Almeida Santos,
  • Davi Salomão Soares Corrêa,
  • Luís Felipe Oliveira de Melo,
  • João Paulo Javidi da Costa,
  • José Alfredo Ruiz Vargas,
  • Daniel Alves da Silva and
  • Tai Fei

19 December 2025

Autonomous vehicles (AVs) are transforming transportation by improving safety, efficiency, and intelligence through integrated sensing, computing, and communication technologies. However, their growing reliance on Vehicle-to-Everything (V2X) communic...

  • Article
  • Open Access
25 Citations
5,673 Views
19 Pages

A Dyna-Q-Based Solution for UAV Networks Against Smart Jamming Attacks

  • Zhiwei Li,
  • Yu Lu,
  • Yun Shi,
  • Zengguang Wang,
  • Wenxin Qiao and
  • Yicen Liu

2 May 2019

Unmanned aerial vehicle (UAV) networks have a wide range of applications, such as in the Internet of Things (IoT), 5G communications, and so forth. However, the communications between UAVs and UAVs to ground control stations mainly use radio channels...

  • Article
  • Open Access
8 Citations
4,379 Views
19 Pages

22 October 2020

Because of the popularity of wireless technology, jamming attack is one of the most critical issues in wireless networks. Wireless jamming attack is one type of denial-of-service attacks where attackers send malicious messages or signal on a legitima...

  • Article
  • Open Access
7 Citations
7,225 Views
23 Pages

A Lightweight AI-Based Approach for Drone Jamming Detection

  • Sergio Cibecchini,
  • Francesco Chiti and
  • Laura Pierucci

3 January 2025

The future integration of drones in 6G networks will significantly enhance their capabilities, enabling a wide range of new applications based on autonomous operation. However, drone networks are particularly vulnerable to jamming attacks, a type of...

  • Article
  • Open Access
5 Citations
2,623 Views
14 Pages

18 June 2019

The rendezvous process is considered a key operation that allows a secondary user (SU) to access an unused authorized spectrum in cognitive radio networks (CRNs). Most existing works focused on fast guaranteed rendezvous without considering a sophist...

  • Feature Paper
  • Article
  • Open Access
16 Citations
3,734 Views
11 Pages

Protecting Physical Layer Secret Key Generation from Active Attacks

  • Miroslav Mitev,
  • Arsenia Chorti,
  • E. Veronica Belmega and
  • H. Vincent Poor

27 July 2021

Lightweight session key agreement schemes are expected to play a central role in building Internet of things (IoT) security in sixth-generation (6G) networks. A well-established approach deriving from the physical layer is a secret key generation (SK...

  • Review
  • Open Access
156 Citations
12,627 Views
29 Pages

22 February 2019

In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. Our goal is to discuss the utility of different attack modeling and analysis techniques proposed in the literature for addr...

  • Communication
  • Open Access
600 Views
8 Pages

The Sensing Attack: Mechanism and Deployment in Submarine Cable Systems

  • Haokun Song,
  • Xiaoming Chen,
  • Junshi Gao,
  • Tianpu Yang,
  • Jianhua Xi,
  • Xiaoqing Zhu,
  • Shuo Sun,
  • Wenjing Yu,
  • Xinyu Bai and
  • Chen Wei
  • + 1 author

30 September 2025

Submarine cable systems, serving as the critical backbone of global communications, face evolving resilience threats. This work proposes a novel sensing attack that utilizes ultra-narrow-linewidth lasers to surveil these infrastructures. First, the N...

  • Article
  • Open Access
11 Citations
3,694 Views
18 Pages

Distributed Extended Kalman Filtering Based Techniques for 3-D UAV Jamming Localization

  • Waleed Aldosari,
  • Muhammad Moinuddin,
  • Abdulah Jeza Aljohani and
  • Ubaid M. Al-Saggaf

10 November 2020

Wireless networks are vulnerable to jamming attacks. Jamming in wireless communication becomes a major research problem due to ease in Unmanned Aerial Vehicle (UAV) launching and blocking of communication channels. Jamming is a subset of Denial of Se...

  • Article
  • Open Access
19 Citations
8,766 Views
22 Pages

Low-Cost Implementation of Reactive Jammer on LoRaWAN Network

  • Toni Perković,
  • Hrvoje Rudeš,
  • Slaven Damjanović and
  • Antun Nakić

The Low-Power Wide-Area Network (LPWA) has already started to gain a notorious adoption in the Internet of Things (IoT) landscape due to its enormous potential. It is already employed in a wide variety of scenarios involving parking lot occupancy, pa...

  • Article
  • Open Access
1 Citations
2,780 Views
16 Pages

5 October 2018

In this paper, we investigate jamming attacks in the physical layer against cooperative communications networks, where a jammer tries to block the data communication between the source and destination. An energy-constrained relay is able to assist th...

  • Article
  • Open Access
1 Citations
1,409 Views
36 Pages

26 February 2025

Network attack detection is a critical issue in complex networks at present, one which becomes even more challenging as the network complexity grows and new threats emerge. Existing security models may encounter problems such as low accuracy, a high...

  • Article
  • Open Access
3 Citations
2,390 Views
21 Pages

2 May 2023

This paper is concerned with the observer-based H proportional-integral-derivative (PID) control issue for discrete-time systems using event-triggered mechanism subject to periodic random denial of service (DoS) jamming attacks and infinitely...

  • Article
  • Open Access
5 Citations
2,084 Views
17 Pages

15 January 2024

Machine learning techniques have attracted considerable attention for wireless networks because of their impressive performance in complicated scenarios and usefulness in various applications. However, training with and sharing raw data obtained loca...

  • Article
  • Open Access
8 Citations
4,966 Views
14 Pages

When wireless communication networks encounter jamming attacks, they experience spectrum resource occupation and data communication failures. In order to address this issue, an anti-jamming algorithm based on distributed multi-agent reinforcement lea...

  • Article
  • Open Access
39 Citations
8,043 Views
20 Pages

The adoption of the global positioning system (GPS) within the marine industry has revolutionized the marine operations by condensing the navigation of a vessel into an integrated bridge system (IBS). An IBS acts as the main command and control of a...

  • Article
  • Open Access
2 Citations
6,262 Views
14 Pages

Study on the Performance of Laser Device for Attacking Miniature UAVs

  • Jianmin Wu,
  • Shijuan Huang,
  • Xiquan Wang,
  • Yunli Kou and
  • Wen Yang

27 September 2024

In order to test the performance of laser devices for attacking miniature UAVs, we studied the principle of laser devices on soft killing and hard killing. Then, the flight test conditions of miniature UAVs were constructed, and the laser devices wer...

  • Article
  • Open Access
2 Citations
3,187 Views
26 Pages

Practical Realization of Reactive Jamming Attack on Long-Range Wide-Area Network

  • Josip Šabić,
  • Toni Perković,
  • Dinko Begušić  and
  • Petar Šolić 

9 April 2025

LoRaWANs are increasingly recognized for their vulnerability to various jamming attacks, which can significantly disrupt communication between end nodes and gateways. This paper explores the feasibility of executing reactive jammers upon detecting pa...

  • Article
  • Open Access
11 Citations
6,824 Views
21 Pages

Analysis of Multi-Antenna GNSS Receiver Performance under Jamming Attacks

  • Niranjana Vagle,
  • Ali Broumandan and
  • Gérard Lachapelle

17 November 2016

Although antenna array-based Global Navigation Satellite System (GNSS) receivers can be used to mitigate both narrowband and wideband electronic interference sources, measurement distortions induced by array processing methods are not suitable for hi...

  • Article
  • Open Access
61 Citations
13,007 Views
36 Pages

8 April 2010

The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system...

  • Article
  • Open Access
10 Citations
3,560 Views
23 Pages

New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks

  • Carolina Del-Valle-Soto,
  • Carlos Mex-Perera,
  • Ivan Aldaya,
  • Fernando Lezama,
  • Juan Arturo Nolazco-Flores and
  • Raul Monroy

31 May 2019

In this work, two new self-tuning collaborative-based mechanisms for jamming detection are proposed. These techniques are named (i) Connected Mechanism and (ii) Extended Mechanism. The first one detects jamming by comparing the performance parameters...

  • Feature Paper
  • Article
  • Open Access
35 Citations
13,287 Views
21 Pages

GridAttackSim: A Cyber Attack Simulation Framework for Smart Grids

  • Tan Duy Le,
  • Adnan Anwar,
  • Seng W. Loke,
  • Razvan Beuran and
  • Yasuo Tan

The smart grid system is one of the key infrastructures required to sustain our future society. It is a complex system that comprises two independent parts: power grids and communication networks. There have been several cyber attacks on smart grid s...

  • Article
  • Open Access
577 Views
25 Pages

Position Spoofing Attacks on Unmanned Surface Vehicles

  • Jia Wang,
  • Yang Xiao,
  • Tieshan Li and
  • Philip C. L. Chen

28 November 2025

Unmanned surface vehicles (USVs) are equipped with numerous sensors, and data is transmitted through networks. Attackers may remotely compromise unmanned surface vehicle (USV) systems and commit criminal acts via networks, causing USVs to deviate fro...

  • Article
  • Open Access
17 Citations
4,701 Views
21 Pages

Impacts of GPS Spoofing on Path Planning of Unmanned Surface Ships

  • Jia Wang,
  • Yang Xiao,
  • Tieshan Li and
  • C. L. Philip Chen

The Artificial Potential Field (APF) method is a classical path planning method for unmanned ships, relying on Global Positioning System (GPS) positioning information for path planning. Unfortunately, once the path planning algorithm uses inaccurate...

  • Article
  • Open Access
1 Citations
1,645 Views
20 Pages

Performance Analysis and Security Preservation of DSRC in V2X Networks

  • Muhammad Saad Sohail,
  • Giancarlo Portomauro,
  • Giovanni Battista Gaggero,
  • Fabio Patrone and
  • Mario Marchese

24 September 2025

Protecting communications within vehicular networks is of paramount importance, particularly when data are transmitted using wireless ad-hoc technologies such as Dedicated Short-Range Communications (DSRC). Vulnerabilities in Vehicle-to-Everything (V...

  • Article
  • Open Access
7 Citations
3,515 Views
25 Pages

Jam Mitigation for Autonomous Convoys via Behavior-Based Robotics

  • Calvin Cheung,
  • Samir Rawashdeh and
  • Alireza Mohammadi

30 September 2022

Autonomous ground vehicle convoys heavily rely on wireless communications to perform leader-follower operations, which make them particularly vulnerable to denial-of-service attacks such as jamming. To mitigate the effects of jamming on autonomous co...

  • Article
  • Open Access
1 Citations
2,415 Views
28 Pages

Detecting Jamming in Smart Grid Communications via Deep Learning

  • Muhammad Irfan,
  • Aymen Omri,
  • Javier Hernandez Fernandez,
  • Savio Sciancalepore and
  • Gabriele Oligeri

Power-Line Communication (PLC) allows data transmission through existing power lines, thus avoiding the expensive deployment of ad hoc network infrastructures. However, power line networks remain vastly unattended, which allows tampering by malicious...

  • Proceeding Paper
  • Open Access
118 Views
9 Pages

New Approach for Jamming and Spoofing Detection Mechanisms for High Accuracy Solutions

  • María Crespo,
  • Adrián Chamorro,
  • Miguel Ángel Azanza and
  • Ana González

6 February 2026

It is well-known that GNSS high accuracy solutions are increasingly vulnerable to jamming and spoofing attacks, posing significant challenges to their reliability, security, and accuracy. In the past years, GNSS communities have witnessed an increase...

  • Article
  • Open Access
15 Citations
3,269 Views
18 Pages

Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework for Civilian Urban Air Mobility

  • Md. Shirajum Munir,
  • Sumit Howlader Dipro,
  • Kamrul Hasan,
  • Tariqul Islam and
  • Sachin Shetty

5 January 2023

Urban air mobility (UAM) has become a potential candidate for civilization for serving smart citizens, such as through delivery, surveillance, and air taxis. However, safety concerns have grown since commercial UAM uses a publicly available communica...

  • Article
  • Open Access
6 Citations
1,825 Views
12 Pages

Due to the broadcast nature of wireless communication, it is vulnerable to malicious jamming attacks. Meanwhile, multiple users need to share the limited spectrum resources to enhance the spectrum utilization efficiency because of the scarcity of wir...

  • Article
  • Open Access
12 Citations
7,441 Views
25 Pages

Investigating Radio Frequency Vulnerabilities in the Internet of Things (IoT)

  • Eirini Anthi,
  • Lowri Williams,
  • Vasilis Ieropoulos and
  • Theodoros Spyridopoulos

6 June 2024

With the increase in the adoption of Internet of Things (IoT) devices, the security threat they face has become more pervasive. Recent research has demonstrated that most IoT devices are insecure and vulnerable to a range of cyber attacks. The impact...

  • Review
  • Open Access
57 Citations
26,478 Views
28 Pages

Recent Advances on Jamming and Spoofing Detection in GNSS

  • Katarina Radoš,
  • Marta Brkić and
  • Dinko Begušić

28 June 2024

Increased interest in the development and integration of navigation and positioning services into a wide range of receivers makes them susceptible to a variety of security attacks such as Global Navigation Satellite Systems (GNSS) jamming and spoofin...

  • Article
  • Open Access
4 Citations
2,945 Views
21 Pages

27 January 2021

Multiple access channel (MAC) networks use a broadcasting algorithm called the Binary Exponential Backoff (BEB) to mediate access to the shared communication channel by competing nodes and resolve their collisions. While the BEB achieves fair through...

  • Article
  • Open Access
6 Citations
3,092 Views
20 Pages

9 April 2023

Wireless sensor networks (WSNs) are widely used in various fields, and the reliability and performance of WSNs are critical for their applications. However, WSNs are vulnerable to jamming attacks, and the impact of movable jammers on WSNs’ reli...

  • Article
  • Open Access
12 Citations
4,916 Views
22 Pages

21 February 2019

As the core component of the smart grid, advanced metering infrastructure (AMI) is responsible for automated billing, demand response, load forecasting, management, etc. The jamming attack poses a serious threat to the AMI communication networks, esp...

  • Article
  • Open Access
3 Citations
3,712 Views
17 Pages

18 November 2017

In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a wireless sensor network (WSN). In the WSN, a central head sensor (HS) collects the information from distributed SNs, and jammers disturb the informat...

of 3