RF-WAVEGUARD: Enhancing UAV Security Against Signal Jamming Attacks through Radio Frequency Watermarking
Abstract
References
Index Terms
- RF-WAVEGUARD: Enhancing UAV Security Against Signal Jamming Attacks through Radio Frequency Watermarking
Recommendations
Jamming attacks and defenses for fast association in IEEE 802.11ah networks
AbstractTo reduce network congestion, most fast association mechanisms in 802.11ah networks control the number of devices to associate each round based on the management queue size. However, the management queue can be manipulated easily by ...
An Adaptable Module for Designing Jamming Attacks in WiFi Networks for ns-3
MSWiM '22: Proceedings of the 25th International ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile SystemsThe inherent openness of wireless communication techniques has made them vulnerable to jamming attacks. However, the effectiveness of a jamming attack depends on numerous parameters and varies according to the state of the environment. At the same time, ...
Inferring distributed reflection denial of service attacks from darknet
This work proposes a novel approach to infer and characterize Internet-scale DNS Distributed Reflection Denial of Service (DRDoS) attacks by leveraging the darknet space. Complementary to the pioneer work on inferring Distributed Denial of Service (DDoS)...
Comments
Information & Contributors
Information
Published In
- Program Chairs:
- Maanak Gupta,
- Mahmoud Abdelsalam,
- Mir Pritom,
- Feras Awaysheh
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- The Italian Ministry for Universities and Research (MUR)
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 47Total Downloads
- Downloads (Last 12 months)47
- Downloads (Last 6 weeks)18
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in