Your threat model should identify whether there are threats to your IoT systems associated with jamming attacks. This threat is different for each type of IoT system.
For example, unmanned aerial systems might be highly susceptible to jamming attacks. In this case, mitigations such as building in logic within the drone to Return to Launch (RTL) is important (although this assumes the availability of Global Positioning System (GPS) satellite connectivity). Without these safeguards, the drone might simply be lost, or, worse, crash into someone on the ground.
Connected vehicles represent another critical IoT system for which jamming is a major concern. The suppression of Basic Safety Messages (BSMs) from one ...