IRS-Based Wireless Jamming Attacks: When Jammers Can Attack Without Power.
Bin LyuDinh Thai HoangShimin GongDusit NiyatoDong In KimPublished in: IEEE Wirel. Commun. Lett. (2020)
Keyphrases
- cognitive radio
- countermeasures
- spectrum sensing
- attack detection
- malicious nodes
- malicious users
- malicious attacks
- cognitive radio networks
- denial of service attacks
- differential power analysis
- power analysis
- ddos attacks
- dos attacks
- wireless communication
- attack scenarios
- injection attacks
- data corruption
- fault injection
- wireless networks
- cyber attacks
- denial of service
- power consumption
- detecting malicious
- security vulnerabilities
- block cipher
- security risks
- phishing attacks
- network attacks
- network intrusion
- intrusion detection
- network intrusions
- normal traffic
- digital watermark
- misuse detection
- mobile ad hoc networks
- java card
- malicious activities
- mobile devices
- defense mechanisms
- intrusion detection system
- smart card
- communication systems
- network traffic
- information security
- security threats
- computer security
- base station