An electronic warfare approach for deploying a software-based Wi-Fi jammer
Some prominent instances have been centered on electronic warfare. For example, the American military has made significant investments in automation through UAV programs, only for competitors like the Iranians to create strategies to interfere with these systems. Iran managed to capture a top-secret...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Kaushik, Keshav Negi, Rahul Dev, Prabhav |
description | Some prominent instances have been centered on electronic warfare. For
example, the American military has made significant investments in automation
through UAV programs, only for competitors like the Iranians to create
strategies to interfere with these systems. Iran managed to capture a
top-secret U.S. surveil-lance drone by fooling it into descending in the
incorrect place by jamming its control signals and providing it with bogus GPS
data. In this paper, the authors have focused on the electronic warfare
approach for deploying a software-based Wi-Fi jammer. The software-based Wi-Fi
jammer can disconnect the targets using the DoS pursuit mode. The paper
describes the unique methodology of how software can also be used for jamming
wireless signals. |
doi_str_mv | 10.48550/arxiv.2212.14470 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2212_14470</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2212_14470</sourcerecordid><originalsourceid>FETCH-LOGICAL-a670-4382164b36a89af01c0b74309c266383a31e25b829487a2bba7404c8f0ed3f03</originalsourceid><addsrcrecordid>eNotz7lOAzEUhWE3FCjwAFT4BTxcL2N7yigiLIqUAiTK0bXnGoxmkycC8vZAoDrNryN9jF1JqIyva7jB8pU_KqWkqqQxDs7Z43rk1FM8lGnMkX9iSViI4zyXCeMbT1PhHc39dMzjK0e-TOnwE5EIuFDHX7LYZv6Ow0Dlgp0l7Be6_N8Ve9rePm_uxW5_97BZ7wRaB8Jor6Q1QVv0DSaQEYIzGpqorNVeo5ak6uBVY7xDFQI6Ayb6BNTpBHrFrv9eT5Z2LnnAcmx_Te3JpL8Bh9ZF1g</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>An electronic warfare approach for deploying a software-based Wi-Fi jammer</title><source>arXiv.org</source><creator>Kaushik, Keshav ; Negi, Rahul ; Dev, Prabhav</creator><creatorcontrib>Kaushik, Keshav ; Negi, Rahul ; Dev, Prabhav</creatorcontrib><description>Some prominent instances have been centered on electronic warfare. For
example, the American military has made significant investments in automation
through UAV programs, only for competitors like the Iranians to create
strategies to interfere with these systems. Iran managed to capture a
top-secret U.S. surveil-lance drone by fooling it into descending in the
incorrect place by jamming its control signals and providing it with bogus GPS
data. In this paper, the authors have focused on the electronic warfare
approach for deploying a software-based Wi-Fi jammer. The software-based Wi-Fi
jammer can disconnect the targets using the DoS pursuit mode. The paper
describes the unique methodology of how software can also be used for jamming
wireless signals.</description><identifier>DOI: 10.48550/arxiv.2212.14470</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2022-12</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2212.14470$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2212.14470$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Kaushik, Keshav</creatorcontrib><creatorcontrib>Negi, Rahul</creatorcontrib><creatorcontrib>Dev, Prabhav</creatorcontrib><title>An electronic warfare approach for deploying a software-based Wi-Fi jammer</title><description>Some prominent instances have been centered on electronic warfare. For
example, the American military has made significant investments in automation
through UAV programs, only for competitors like the Iranians to create
strategies to interfere with these systems. Iran managed to capture a
top-secret U.S. surveil-lance drone by fooling it into descending in the
incorrect place by jamming its control signals and providing it with bogus GPS
data. In this paper, the authors have focused on the electronic warfare
approach for deploying a software-based Wi-Fi jammer. The software-based Wi-Fi
jammer can disconnect the targets using the DoS pursuit mode. The paper
describes the unique methodology of how software can also be used for jamming
wireless signals.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz7lOAzEUhWE3FCjwAFT4BTxcL2N7yigiLIqUAiTK0bXnGoxmkycC8vZAoDrNryN9jF1JqIyva7jB8pU_KqWkqqQxDs7Z43rk1FM8lGnMkX9iSViI4zyXCeMbT1PhHc39dMzjK0e-TOnwE5EIuFDHX7LYZv6Ow0Dlgp0l7Be6_N8Ve9rePm_uxW5_97BZ7wRaB8Jor6Q1QVv0DSaQEYIzGpqorNVeo5ak6uBVY7xDFQI6Ayb6BNTpBHrFrv9eT5Z2LnnAcmx_Te3JpL8Bh9ZF1g</recordid><startdate>20221229</startdate><enddate>20221229</enddate><creator>Kaushik, Keshav</creator><creator>Negi, Rahul</creator><creator>Dev, Prabhav</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20221229</creationdate><title>An electronic warfare approach for deploying a software-based Wi-Fi jammer</title><author>Kaushik, Keshav ; Negi, Rahul ; Dev, Prabhav</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a670-4382164b36a89af01c0b74309c266383a31e25b829487a2bba7404c8f0ed3f03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Kaushik, Keshav</creatorcontrib><creatorcontrib>Negi, Rahul</creatorcontrib><creatorcontrib>Dev, Prabhav</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kaushik, Keshav</au><au>Negi, Rahul</au><au>Dev, Prabhav</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An electronic warfare approach for deploying a software-based Wi-Fi jammer</atitle><date>2022-12-29</date><risdate>2022</risdate><abstract>Some prominent instances have been centered on electronic warfare. For
example, the American military has made significant investments in automation
through UAV programs, only for competitors like the Iranians to create
strategies to interfere with these systems. Iran managed to capture a
top-secret U.S. surveil-lance drone by fooling it into descending in the
incorrect place by jamming its control signals and providing it with bogus GPS
data. In this paper, the authors have focused on the electronic warfare
approach for deploying a software-based Wi-Fi jammer. The software-based Wi-Fi
jammer can disconnect the targets using the DoS pursuit mode. The paper
describes the unique methodology of how software can also be used for jamming
wireless signals.</abstract><doi>10.48550/arxiv.2212.14470</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.2212.14470 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_2212_14470 |
source | arXiv.org |
subjects | Computer Science - Cryptography and Security |
title | An electronic warfare approach for deploying a software-based Wi-Fi jammer |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T08%3A20%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20electronic%20warfare%20approach%20for%20deploying%20a%20software-based%20Wi-Fi%20jammer&rft.au=Kaushik,%20Keshav&rft.date=2022-12-29&rft_id=info:doi/10.48550/arxiv.2212.14470&rft_dat=%3Carxiv_GOX%3E2212_14470%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |