Radio jamming

Known as: Jamming, Electromagnetic jamming, Communications System Jamming 
A radio jammer is any device that deliberately blocks, jams or interferes with authorized wireless communications. In the United States, jammers are… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1965-2017
020040060019652017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and… (More)
  • table 1
  • figure 2
  • figure 3
  • table 2
  • table 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Crucial to the successful deployment of cognitive radio networks, security issues have begun to receive research interests… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Various spectrum management schemes have been proposed in recent years to improve the spectrum utilization in cognitive radio… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Jamming is a very effective denial-of-service attack that renders most higher-layer security mechanisms moot - yet it is often… (More)
  • figure 2
  • figure 3
  • figure 5
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2000
2000
The dependence on Mobile Networks is growing. The success of the Internet was followed by Denial of Service attacks. What if the… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
  • table 4
Is this relevant?
Highly Cited
1987
Highly Cited
1987
The design of a packet radio network must reflect the operational requirements and environmental constraints to which it is… (More)
  • table I
  • figure I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?