Download now Free registration required
Jamming, broadcasting to intentionally interfere with wireless reception has long been a problem for wireless systems. Recent research demonstrates numerous advances in jamming techniques that increase attack efficiency or reduce the probability an attack will be detected by choosing attack parameters based on a system's configuration. In this paper, the authors extend the attacker's capabilities by modifying the attack parameters in response to the observed performance of the target system, effectively creating a feedback loop in their attack model. This framework allows for more intricate attack models that are tuned online allowing for closer to optimal attacks against legitimate systems.
- Format: PDF
- Size: 798 KB