Protecting against jamming attacks

Your threat model should identify whether there are threats to your IoT systems associated with jamming attacks. This threat is different for each type of IoT system.

For example, unmanned aerial systems might be highly susceptible to jamming attacks. In this case, mitigations such as building in logic within the drone to Return to Launch (RTL) is important (although this assumes the availability of Global Positioning System (GPS) satellite connectivity). Without these safeguards, the drone might simply be lost, or, worse, crash into someone on the ground.

Connected vehicles represent another critical IoT system for which jamming is a major concern. The suppression of Basic Safety Messages (BSMs) from one ...

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.