An electronic warfare approach for deploying a software-based Wi-Fi jammer

Keshav Kaushik,Rahul Negi,Prabhav Dev
DOI: https://doi.org/10.48550/arXiv.2212.14470
2022-12-29
Cryptography and Security
Abstract:Some prominent instances have been centered on electronic warfare. For example, the American military has made significant investments in automation through UAV programs, only for competitors like the Iranians to create strategies to interfere with these systems. Iran managed to capture a top-secret U.S. surveil-lance drone by fooling it into descending in the incorrect place by jamming its control signals and providing it with bogus GPS data. In this paper, the authors have focused on the electronic warfare approach for deploying a software-based Wi-Fi jammer. The software-based Wi-Fi jammer can disconnect the targets using the DoS pursuit mode. The paper describes the unique methodology of how software can also be used for jamming wireless signals.
What problem does this paper attempt to address?