An electronic warfare approach for deploying a software-based Wi-Fi jammer

Some prominent instances have been centered on electronic warfare. For example, the American military has made significant investments in automation through UAV programs, only for competitors like the Iranians to create strategies to interfere with these systems. Iran managed to capture a top-secret...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kaushik, Keshav, Negi, Rahul, Dev, Prabhav
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Kaushik, Keshav
Negi, Rahul
Dev, Prabhav
description Some prominent instances have been centered on electronic warfare. For example, the American military has made significant investments in automation through UAV programs, only for competitors like the Iranians to create strategies to interfere with these systems. Iran managed to capture a top-secret U.S. surveil-lance drone by fooling it into descending in the incorrect place by jamming its control signals and providing it with bogus GPS data. In this paper, the authors have focused on the electronic warfare approach for deploying a software-based Wi-Fi jammer. The software-based Wi-Fi jammer can disconnect the targets using the DoS pursuit mode. The paper describes the unique methodology of how software can also be used for jamming wireless signals.
doi_str_mv 10.48550/arxiv.2212.14470
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2212_14470</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2212_14470</sourcerecordid><originalsourceid>FETCH-LOGICAL-a670-4382164b36a89af01c0b74309c266383a31e25b829487a2bba7404c8f0ed3f03</originalsourceid><addsrcrecordid>eNotz7lOAzEUhWE3FCjwAFT4BTxcL2N7yigiLIqUAiTK0bXnGoxmkycC8vZAoDrNryN9jF1JqIyva7jB8pU_KqWkqqQxDs7Z43rk1FM8lGnMkX9iSViI4zyXCeMbT1PhHc39dMzjK0e-TOnwE5EIuFDHX7LYZv6Ow0Dlgp0l7Be6_N8Ve9rePm_uxW5_97BZ7wRaB8Jor6Q1QVv0DSaQEYIzGpqorNVeo5ak6uBVY7xDFQI6Ayb6BNTpBHrFrv9eT5Z2LnnAcmx_Te3JpL8Bh9ZF1g</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>An electronic warfare approach for deploying a software-based Wi-Fi jammer</title><source>arXiv.org</source><creator>Kaushik, Keshav ; Negi, Rahul ; Dev, Prabhav</creator><creatorcontrib>Kaushik, Keshav ; Negi, Rahul ; Dev, Prabhav</creatorcontrib><description>Some prominent instances have been centered on electronic warfare. For example, the American military has made significant investments in automation through UAV programs, only for competitors like the Iranians to create strategies to interfere with these systems. Iran managed to capture a top-secret U.S. surveil-lance drone by fooling it into descending in the incorrect place by jamming its control signals and providing it with bogus GPS data. In this paper, the authors have focused on the electronic warfare approach for deploying a software-based Wi-Fi jammer. The software-based Wi-Fi jammer can disconnect the targets using the DoS pursuit mode. The paper describes the unique methodology of how software can also be used for jamming wireless signals.</description><identifier>DOI: 10.48550/arxiv.2212.14470</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2022-12</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2212.14470$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2212.14470$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Kaushik, Keshav</creatorcontrib><creatorcontrib>Negi, Rahul</creatorcontrib><creatorcontrib>Dev, Prabhav</creatorcontrib><title>An electronic warfare approach for deploying a software-based Wi-Fi jammer</title><description>Some prominent instances have been centered on electronic warfare. For example, the American military has made significant investments in automation through UAV programs, only for competitors like the Iranians to create strategies to interfere with these systems. Iran managed to capture a top-secret U.S. surveil-lance drone by fooling it into descending in the incorrect place by jamming its control signals and providing it with bogus GPS data. In this paper, the authors have focused on the electronic warfare approach for deploying a software-based Wi-Fi jammer. The software-based Wi-Fi jammer can disconnect the targets using the DoS pursuit mode. The paper describes the unique methodology of how software can also be used for jamming wireless signals.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz7lOAzEUhWE3FCjwAFT4BTxcL2N7yigiLIqUAiTK0bXnGoxmkycC8vZAoDrNryN9jF1JqIyva7jB8pU_KqWkqqQxDs7Z43rk1FM8lGnMkX9iSViI4zyXCeMbT1PhHc39dMzjK0e-TOnwE5EIuFDHX7LYZv6Ow0Dlgp0l7Be6_N8Ve9rePm_uxW5_97BZ7wRaB8Jor6Q1QVv0DSaQEYIzGpqorNVeo5ak6uBVY7xDFQI6Ayb6BNTpBHrFrv9eT5Z2LnnAcmx_Te3JpL8Bh9ZF1g</recordid><startdate>20221229</startdate><enddate>20221229</enddate><creator>Kaushik, Keshav</creator><creator>Negi, Rahul</creator><creator>Dev, Prabhav</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20221229</creationdate><title>An electronic warfare approach for deploying a software-based Wi-Fi jammer</title><author>Kaushik, Keshav ; Negi, Rahul ; Dev, Prabhav</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a670-4382164b36a89af01c0b74309c266383a31e25b829487a2bba7404c8f0ed3f03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Kaushik, Keshav</creatorcontrib><creatorcontrib>Negi, Rahul</creatorcontrib><creatorcontrib>Dev, Prabhav</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kaushik, Keshav</au><au>Negi, Rahul</au><au>Dev, Prabhav</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An electronic warfare approach for deploying a software-based Wi-Fi jammer</atitle><date>2022-12-29</date><risdate>2022</risdate><abstract>Some prominent instances have been centered on electronic warfare. For example, the American military has made significant investments in automation through UAV programs, only for competitors like the Iranians to create strategies to interfere with these systems. Iran managed to capture a top-secret U.S. surveil-lance drone by fooling it into descending in the incorrect place by jamming its control signals and providing it with bogus GPS data. In this paper, the authors have focused on the electronic warfare approach for deploying a software-based Wi-Fi jammer. The software-based Wi-Fi jammer can disconnect the targets using the DoS pursuit mode. The paper describes the unique methodology of how software can also be used for jamming wireless signals.</abstract><doi>10.48550/arxiv.2212.14470</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2212.14470
ispartof
issn
language eng
recordid cdi_arxiv_primary_2212_14470
source arXiv.org
subjects Computer Science - Cryptography and Security
title An electronic warfare approach for deploying a software-based Wi-Fi jammer
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T08%3A20%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20electronic%20warfare%20approach%20for%20deploying%20a%20software-based%20Wi-Fi%20jammer&rft.au=Kaushik,%20Keshav&rft.date=2022-12-29&rft_id=info:doi/10.48550/arxiv.2212.14470&rft_dat=%3Carxiv_GOX%3E2212_14470%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true