Skip to main content

Jamming Attack Defense

  • Reference work entry
Encyclopedia of Cryptography and Security

Synonyms

Anti-jamming strategy; Radio interference attack defense

Related Concepts

Communication Systems; Denial of Service Attack

Definition

Jamming attack defense is a measure performed by wireless devices to ensure that information can be transmitted and received correctly despite deliberate jamming attempts. The jamming attack defense can be implemented in hardware or software forms.

Background

Spread spectrum techniques are the earliest known anti-jamming countermeasures and come in many forms. Among all forms, frequency-hopping is the first invention. In the early twentieth century, Nikola Tesla touched on the concept of frequency hopping in his 1903 US Patent 723,188 and 1903 US Patent 725,605. These patents involve altering the carrier frequency or other exclusive characteristics to achieve immunity to interference. Frequency hopping is also mentioned by radio pioneer Johannes Zenneck in his book “Wireless Telegraphy” (German, 1908, English translation McGraw Hill, 1915), by a...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Adamy D (2004) EW 102: a second course in electronic warfare. Artech House

    Google Scholar 

  2. Chen Y, Xu W, Trappe W, Zhang Y (2009) Securing emerging wireless systems -lower-layer approaches. Springer

    Book  Google Scholar 

  3. Chung F, Salehi J, Wei V (1989) Optical orthogonal codes: design, analysis and applications. IEEE Trans Inform Theory, 35(3): 595–604

    Article  MATH  MathSciNet  Google Scholar 

  4. Code of Federal Regulations. 47 cfr 15.247. http://frwebgate.access.gpo.gov/

  5. Dixon R (1976) Spread spectrum systems. Wiley, New York

    Google Scholar 

  6. George Mason University School of Law. The genesis of unlicensed wireless policy: how spread spectrum devices won access to license-exempt band-width. http://iep.gmu.edu/UnlicensedWireless

  7. Kim S, Stark W (1989) Optimum rate reed-solomon codes for frequency-hopped spread-spectrum multiple-access communication systems. IEEE Trans Commun

    Google Scholar 

  8. Ma K, Zhang Y, Trappe W (2005) Mobile network management and robust spatial retreats via network dynamics. In: Proceedings of the 1st International workshop on resource provisioning and management in sensor networks (RPMSN 05)

    Google Scholar 

  9. Marcus MJ Early civil spread spectrum history. http://www.marcus-spectrum.com/SSHistory.htm

  10. Navda V, Bohra A, Ganguly S, Izmailov R, Rubenstein D (2007) Using channel hopping to increase 802.11 resilience to jamming attacks. In: IEEE Infocom Minisymposium, pp 2526–2530

    Google Scholar 

  11. Peterson WW, Weldon EJ (1972) Error-correcting codes. MIT Press

    MATH  Google Scholar 

  12. Viterbi AJ, Omura JK (1979) Principles of digital communication and coding. McGraw-Hill

    MATH  Google Scholar 

  13. Wood AD, Stankovic JA, Zhou G (2007) Deejam: defeating energy efficient jamming in ieee 802.15.4-based wireless networks. In: Communications society conference on sensor, mesh and ad hoc communications and networks (SECON)

    Google Scholar 

  14. Xu W, Trappe W, Zhang Y (2007) Channel surfing: defending wireless sensor networks from interference. In: IPSN ’07, Proceedings of the 6th international conference on Information processing in sensor networks, pp 499–508

    Chapter  Google Scholar 

  15. Xu W, Trappe W, Zhang Y (2008). Anti-jamming timing channels for wireless networks. In: WiSec ’08, Proceedings of the first ACM conference on wireless network security, New York. pp 203–213

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Xu, W. (2011). Jamming Attack Defense. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_632

Download citation

Publish with us

Policies and ethics