What is it about?

Industrial operations increasingly rely on wireless sensor networks (like LoRaWAN) to monitor safety and equipment. However, these networks face a major threat: "jamming attacks," where a jammer blocks wireless signals, effectively blinding the system. Detecting these attacks is difficult because wireless networks are naturally "noisy"—signals often fail due to walls, weather, or interference, which can look exactly like an attack. Our research introduces a novel detection framework that solves this problem without requiring expensive hardware or draining the sensors' batteries. Instead of asking the sensors to analyze signal strength, our method looks at the central network server. It analyzes the history of data upload failures. By using smart algorithms to filter these patterns, the system can distinguish between a random connection glitch (noise) and a deliberate attack. Furthermore, if the attacker is moving (e.g., driving a vehicle with a jamming device), our system can reconstruct their path based on which sensors go offline and when.

Featured Image

Why is it important?

As we build "Cyber-Physical Systems" (smart cities, automated factories), the reliability of data is critical for safety. This work is significant for three reasons: 1. Zero Overhead: Most security methods force tiny, battery-powered sensors to do complex calculations. Our approach happens entirely at the backend server, saving sensor energy and extending the network's lifespan. 2. Reduced False Alarms: In industrial environments, metal objects and machinery often block signals. Traditional detectors might flag these as attacks. Our method successfully separates these benign faults from actual malicious behavior, reducing "alert fatigue" for security operators. 3. Actionable Intelligence: Beyond just detecting an attack, our ability to estimate the attacker's trajectory allows security teams to physically locate and stop the threat in real-time.

Perspectives

We approached this challenge with a specific constraint: how can we secure low-power IoT networks without changing the hardware or draining their batteries? We realized that the absence of data tells a story. By treating missing data packets not just as errors, but as forensic clues, we turned standard server logs into a powerful security tool. This research demonstrates that we can achieve high-level security in simple devices by leveraging the computing power of the cloud/server rather than the edge.

Xiaoyi Su
City University of Hong Kong

Read the Original

This page is a summary of: Cybersecurity in Cyber-Physical Systems: Wireless Jamming Attack Detection in Noisy LoRaWAN Environment, ACM Transactions on Cyber-Physical Systems, November 2025, ACM (Association for Computing Machinery),
DOI: 10.1145/3777454.
You can read the full text:

Read

Contributors

The following have contributed to this page