Related Concepts
Definition
Jamming attack defense is a measure performed by wireless devices to ensure that information can be transmitted and received correctly despite deliberate jamming attempts. The jamming attack defense can be implemented in hardware or software forms.
Background
Spread spectrum techniques are the earliest known anti-jamming countermeasures and come in many forms. Among all forms, frequency-hopping is the first invention. In the early twentieth century, Nikola Tesla touched on the concept of frequency hopping in his 1903 US Patent 723,188 and 1903 US Patent 725,605. These patents involve altering the carrier frequency or other exclusive characteristics to achieve immunity to interference. Frequency hopping is also mentioned by radio pioneer Johannes Zenneck in his book “Wireless Telegraphy” (German, 1908, English translation McGraw Hill, 1915), by a...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Adamy D (2004) EW 102: a second course in electronic warfare. Artech House
Chen Y, Xu W, Trappe W, Zhang Y (2009) Securing emerging wireless systems -lower-layer approaches. Springer
Chung F, Salehi J, Wei V (1989) Optical orthogonal codes: design, analysis and applications. IEEE Trans Inform Theory, 35(3): 595–604
Code of Federal Regulations. 47 cfr 15.247. http://frwebgate.access.gpo.gov/
Dixon R (1976) Spread spectrum systems. Wiley, New York
George Mason University School of Law. The genesis of unlicensed wireless policy: how spread spectrum devices won access to license-exempt band-width. http://iep.gmu.edu/UnlicensedWireless
Kim S, Stark W (1989) Optimum rate reed-solomon codes for frequency-hopped spread-spectrum multiple-access communication systems. IEEE Trans Commun
Ma K, Zhang Y, Trappe W (2005) Mobile network management and robust spatial retreats via network dynamics. In: Proceedings of the 1st International workshop on resource provisioning and management in sensor networks (RPMSN 05)
Marcus MJ Early civil spread spectrum history. http://www.marcus-spectrum.com/SSHistory.htm
Navda V, Bohra A, Ganguly S, Izmailov R, Rubenstein D (2007) Using channel hopping to increase 802.11 resilience to jamming attacks. In: IEEE Infocom Minisymposium, pp 2526–2530
Peterson WW, Weldon EJ (1972) Error-correcting codes. MIT Press
Viterbi AJ, Omura JK (1979) Principles of digital communication and coding. McGraw-Hill
Wood AD, Stankovic JA, Zhou G (2007) Deejam: defeating energy efficient jamming in ieee 802.15.4-based wireless networks. In: Communications society conference on sensor, mesh and ad hoc communications and networks (SECON)
Xu W, Trappe W, Zhang Y (2007) Channel surfing: defending wireless sensor networks from interference. In: IPSN ’07, Proceedings of the 6th international conference on Information processing in sensor networks, pp 499–508
Xu W, Trappe W, Zhang Y (2008). Anti-jamming timing channels for wireless networks. In: WiSec ’08, Proceedings of the first ACM conference on wireless network security, New York. pp 203–213
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Xu, W. (2011). Jamming Attack Defense. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_632
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_632
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering