Articles with "jamming attack" as a keyword



Photo by nampoh from unsplash

Optimal Jamming Attack Scheduling of Interactive Channels

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2995939

Abstract: Recently, public attention is thoroughly aroused as to the security threats of Cyber-Physical Systems (CPS), which can seriously disrupt the system operation. In order to analyze the impact of potential cyber-attacks, one needs to investigate… read more here.

Keywords: attack scheduling; optimal jamming; interactive channels; attack ... See more keywords
Photo from wikipedia

Optimal Jamming Attack System Against Remote State Estimation in Wireless Network Control Systems

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2020.3046483

Abstract: Recently, public attention is thoroughly aroused as to the security threats of Wireless Network Control System (WNCS), which can seriously disrupt the system operation. In order to achieve the attack effect that each sensor is… read more here.

Keywords: system; evaluation; attack; attack system ... See more keywords
Photo by timothybuck from unsplash

Improved Beetle Antennae Algorithm Based on Localization for Jamming Attack in Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3146431

Abstract: When checking and sensing external communication data, wireless sensor networks are susceptible to interfering signals with different frequencies. In order to track the location of the jamming attack point and deploy security defense mechanism, a… read more here.

Keywords: wireless sensor; algorithm; sensor networks; beetle antennae ... See more keywords
Photo from wikipedia

Genetic Algorithm-Based Cumulative Sum Method for Jamming Attack Detection of Cyber-Physical Power Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Instrumentation and Measurement"

DOI: 10.1109/tim.2022.3186360

Abstract: Jamming attack is one of the common malicious attacks in cyber-physical power systems (CPPSs) to intervene measurements and systems. Timely detection of jamming attacks is crucial for real-time monitoring and security of CPPSs. With this… read more here.

Keywords: power systems; genetic algorithm; physical power; detection ... See more keywords
Photo from wikipedia

Mitigating Jamming Attack in 5G Heterogeneous Networks: A Federated Deep Reinforcement Learning Approach

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2022.3212966

Abstract: Jamming attack is one of the serious security breaches in the upcoming fifth-generation heterogeneous networks (5G HetNets). Most of the existing anti-jamming techniques, such as frequency hopping (FH) and direct sequence spread spectrum (DSSS) lack… read more here.

Keywords: federated deep; reinforcement learning; reinforcement; deep reinforcement ... See more keywords