Understanding Next-Generation Jamming Attacks
Wireless communications are subject to various types of noise and interference, and several decades of research has produced reasonably effective approaches to communicate in a variety of settings. However, most approaches that address intentional interference, or jamming, consider only simplified attack models. This project focuses on advancing the state of the art in jamming attack modeling, given recent developments in software-defined radio technology. In addition, adversaries that are aware of higher-layer network functionality can leverage any available information to improve the impact or reduce the resource requirement for attack success. For example, jammers can synchronize their attacks with MAC protocol steps, focus attacks in specific geographic locations, or target packets from specific applications. Moreover, these same offensive techniques can be used to defend against other threats.
