Keywords and phrases: jamming, friendly jamming, confidentiality, authentication, access control.
Received: May 6, 2022; Accepted: June 28, 2022; Published: August 17, 2022
How to cite this article: Kiriakos Gavouchidis and Dimitrios Efstathiou, A survey on jamming and friendly jamming techniques, Far East Journal of Electronics and Communications 25 (2022), 1-36. http://dx.doi.org/10.17654/0973700622001
This Open Access Article is Licensed under Creative Commons Attribution 4.0 International License
References: [1] David Adamy, EW 101: A first course in electronic warfare, Artech House radar library, Artech House, 685 Canton Street, Norwood, MA 02062, 2001. [2] David Adamy, EW 103: Communications electronic warfare, 2008. [3] Adrian Graham, Communications, Radar and Electronic Warfare, John Wiley & Sons, 2011. [4] Daniel S. Berger, Francesco Gringoli, Nicolò Facchi, Ivan Martinovic and Jens B. Schmitt, Friendly jamming on access points: analysis and real-world measurements, IEEE Trans. Wirel. Commun. 15(9) (2016), 6189-6202. [5] National Institute of Standards and Technology, Jamming, 2021. [6] Wenyuan Xu, Wade Trappe, Yanyong Zhang and Timothy Wood, The feasibility of launching and detecting jamming attacks in wireless networks, Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2005, Urbana-Champaign, IL, USA, May 25-27, 2005 (P. R. Kumar, Andrew T. Campbell and Roger Wattenhofer, eds.), ACM, 2005, pp. 46-57. [7] Levente Buttyán and Jean-Pierre Hubaux, Security, and Cooperation in Wireless Networks - Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing, Cambridge University Press, Cambridge, 2007. [8] Marc Lichtman, Jeffrey D. Poston, Sai Dhiraj Amuru, Chowdhury Shahriar, T. Charles Clancy, R. Michael Buehrer and Jeffrey H. Reed, A communications jamming taxonomy, IEEE Secur. Priv. 14(1) (2016), 47-54. [9] Jean-Pierre Hubaux, Security and Cooperation in Wireless Networks, Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers (Levente Buttyán, Virgil D. Gligor and Dirk Westhoff, eds.), Lecture Notes in Computer Science, Vol. 4357, Springer, 2006, 1-2. [10] David L. Adamy, EW 104: Electronic warfare against a new generation of threats -ew100, Artech House, Inc., USA, 2015. [11] Alejandro Proaño and Loukas Lazos, Selective jamming attacks in wireless networks, Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010, IEEE, 2010, pp. 1-6. [12] Triet Dang Vo-Huu, Tien Dang Vo-Huu and Guevara Noubir, Interleaving jamming in wi-fi networks, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WISEC 2016, Darmstadt, Germany, July 18-22, 2016 (Matthias Hollick, Panos Papadimitratos and William Enck, eds.), ACM, 2016, pp. 31-42. [13] Clayton W. Commander, Panos M. Pardalos, Valeriy Ryabchenko, Stan Uryasev and Grigoriy Zrazhevsky, The wireless network jamming problem, J. Comb. Optim. 14(4) (2007), 481-498. [14] Clayton W. Commander, Panos M. Pardalos, Valeriy Ryabchenko, Oleg V. Shylo, Stan Uryasev and Grigoriy Zrazhevsky, Jamming communication networks under complete uncertainty, Optim. Lett. 2(1) (2008), 53-70. [15] Youness Arjoune and Saleh Faruque, Smart jamming attacks in 5g new radio: A review, 10th Annual Computing and Communication Workshop and Conference, CCWC 2020, Las Vegas, NV, USA, January 6-8, 2020, IEEE, 2020, pp. 1010-1015. [16] Marc Lichtman, Roger Piqueras Jover, Mina Labib, Raghunandan M. Rao, Vuk Marojevic and Jeffrey H. Reed, Lte/lte-a jamming, spoofing, and sniffing: threat assessment and mitigation, IEEE Commun. Mag. 54(4) (2016), 54-61. [17] Robert D. Miller and Wade Trappe, On the vulnerabilities of CSI in MIMO wireless communication systems, IEEE Trans. Mob. Comput. 11(8) (2012), 1386-1398. [18] Simon Haykin and Michael Moher, Communication Systems, Wiley, New York, 2009. [19] QiweiWang, Thinh Nguyen, Khanh D. Pham and Hyuck M. Kwon, Mitigating jamming attack: a game-theoretic perspective, IEEE Trans. Veh. Technol. 67(7) (2018), 6063-6074. [20] Beibei Wang, Yongle Wu, K. J. Ray Liu and T. Charles Clancy, An anti-jamming stochastic game for cognitive radio networks, IEEE J. Sel. Areas Commun. 29(4) (2011), 877-889. [21] Luliang Jia, Yuhua Xu, Youming Sun, Shuo Feng and Alagan Anpalagan, Stackelberg game approaches for anti-jamming defense in wireless networks, IEEE Wirel. Commun. 25(6) (2018), 120-128. [22] Dejun Yang, Guoliang Xue, Jin Zhang, Andréa W. Richa and Xi Fang, Coping with a smart jammer in wireless networks: A Stackelberg game approach, IEEE Trans. Wirel. Commun. 12(8) (2013), 4038-4047. [23] Wenyuan Xu, Wade Trappe and Yanyong Zhang, Anti-jamming timing channels for wireless networks, Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008 (Virgil D. Gligor, Jean-Pierre Hubaux and Radha Poovendran, eds.), ACM, 2008, pp. 203-213. [24] Salvatore D’Oro, Eylem Ekici and Sergio Palazzo, Optimal power allocation and scheduling under jamming attacks, IEEE/ACM Trans. Netw. 25(3) (2017), 1310-1323. [25] Alcardo Alex Barakabitze, Arslan Ahmad, Rashid Mijumbi and Andrew Hines, 5g network slicing using SDN and NFV: a survey of taxonomy, architectures, and future challenges, Comput. Networks 167 (2020). https://doi.org/10.1016/j.comnet.2019.106984 [26] Hossein Akhlaghpasand, Emil Björnson and S. Mohammad Razavizadeh, Jamming suppression in massive MIMO systems, IEEE Trans. Circuits Syst. II Express Briefs 67-II (1) (2020), 182-186. [27] Liang Xiao, Xiaozhen Lu, Dongjin Xu, Yuliang Tang, Lei Wang and Weihua Zhuang, UAV relay in vanets against smart jamming with reinforcement learning, IEEE Trans. Veh. Technol. 67(5) (2018), 4087-4097. [28] Tugba Erpek, Yalin E. Sagduyu and Yi Shi, Deep learning for launching and mitigating wireless jamming attacks, IEEE Trans. Cogn. Commun. Netw. 5(1) (2019), 2-14. [29] Linyuan Zhang, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han and Jinlong Wang, Byzantine attack and defense in cognitive radio networks: a survey, IEEE Commun. Surv. Tutorials 17(3) (2015), 1342-1363. [30] Sharaf J. Malebary, Wenyuan Xu and Chin-Tser Huang, Jamming mobility in 802.11p networks: Modeling, evaluation, and detection, 35th IEEE International Performance Computing and Communications Conference, IPCCC 2016, Las Vegas, NV, USA, December 9-11, 2016, IEEE Computer Society, 2016, pp. 1-7. [31] Ikechukwu K. Azogu, Michael T. Ferreira, Jonathan A. Larcom and Hong Liu, A new anti-jamming strategy for vanet metrics-directed security defense, 2013 IEEE Globecom Workshops (GC Wkshps), 2013, pp. 1344-1349. [32] Óscar Puñal, Carlos Pereira, Ana Aguiar and James Gross, Experimental characterization, and modeling of rf jamming attacks on vanets, IEEE Transactions on Vehicular Technology 64(2) (2015), 524-540. [33] Oscar Puñal, Ana Aguiar and James Gross, in vanets we trust? characterizing RF jamming in vehicular networks, Proceedings of the ninth ACM international workshop on Vehicular internetworking, systems, and applications, Vanet 12, Low Wood Bay, Lake District, UK, June 25, 2012 (John B. Kenney, Javier Gozálvez, Fan Bai and Robin Kravets, eds.), ACM, 2012, pp. 83-92. [34] Xiaozhen Lu, Dongjin Xu, Liang Xiao, Lei Wang and Weihua Zhuang, Anti-jamming communication game for uav-aided vanets, 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, December 4-8, 2017, IEEE, 2017, pp. 1-6. [35] Kim Hartmann and Christoph Steup, The vulnerability of uavs to cyber-attacks - an approach to the risk assessment, 5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013 (Karlis Podins, Jan Stinissen and Markus Maybaum, eds.), IEEE, 2013, pp. 1-23. [36] Darius Rudinskas, Zdobyslaw Goraj and Jonas Stanknas, Security analysis of uav radio communication system, Aviation 13(4) (2009), 116-121. [37] Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan and Srdjan Capkun, On limitations of friendly jamming for confidentiality, 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013, IEEE Computer Society, 2013, pp. 160-173. [38] Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi and Kevin Fu, They can hear your heartbeats: noninvasive security for implantable medical devices, Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Toronto, ON, Canada, August 15-19, 2011 (Srinivasan Keshav, Jörg Liebeherr, John W. Byers and Jeffrey C. Mogul, eds.), ACM, 2011, pp. 2-13. [39] Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, and Vincent Lenders, Wifire: a firewall for wireless networks, Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, Toronto, ON, Canada, August 15-19, 2011 (Srinivasan Keshav, Jörg Liebeherr, John W. Byers and Jeffrey C. Mogul, eds.), ACM, 2011, pp. 456-457. [40] Ivan Martinovic, Paul Pichota and Jens B. Schmitt, Jamming for good: a fresh approach to authentic communication in wsns, Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009 (David A. Basin, Srdjan Capkun and Wenke Lee, eds.), ACM, 2009, pp. 161-168. [41] Yifeng Cai, Kunjie Xu, Yijun Mo, Bang Wang and Mu Zhou, Improving WLAN throughput via reactive jamming in the presence of hidden terminals, 2013 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, Shanghai, China, April 7-10, 2013, IEEE, 2013, pp. 1085-1090. [42] James Brown, Ibrahim Ethem Bagci, Alex King and Utz Roedig, Defend your home! jamming unsolicited messages in the smart home, Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (New York, NY, USA), HotWiSec’ 13, Association for Computing Machinery, 2013, pp. 16. [43] Yu Seung Kim, Patrick Tague, Heejo Lee and Hyogon Kim, Carving secure wi-fi zones with defensive jamming, 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS’ 12, Seoul, Korea, May 2-4, 2012 (Heung Youl Youm and Yoojae Won, eds.), ACM, 2012, pp. 53-54. [44] Shyamnath Gollakota and Dina Katabi, Physical layer wireless security made fast and channel independent, INFOCOM 2011, 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China, IEEE, 2011, pp. 1125-1133. [45] Daniel S. Berger, Francesco Gringoli, Nicolò Facchi, Ivan Martinovic and Jens B. Schmitt, Gaining insight on friendly jamming in a real-world IEEE 802.11 network, 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec’14, Oxford, United Kingdom, July 23-25, 2014 (Gergely Ács, Andrew P. Martin, Ivan Martinovic, Claude Castelluccia and Patrick Traynor, eds.), ACM, 2014, pp. 105-116. [46] Wenbo Shen, Peng Ning, Xiaofan He and Huaiyu Dai, Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time, 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013, IEEE Computer Society, 2013, pp. 174-188. [47] Emrah Bayraktaroglu, Christopher King, Xin Liu, Guevara Noubir, Rajmohan Rajaraman and Bishal Thapa, On the performance of IEEE 802.11 under jamming, INFOCOM 2008, 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, IEEE, 2008, pp. 1265-1273. [48] Qubeijian Wang, Hong-Ning Dai, Hao Wang, Guangquan Xu and Arun Kumar Sangaiah, Uav-enabled friendly jamming scheme to secure industrial internet of things, J. Commun. Networks 21(5) (2019), 481-490.
|