I. Introduction
Jamming attacks on wireless networks (incl. Wi-Fi) involve intentional interference with the normal functioning of wireless communication, resulting in disruption or denial-of-service (DoS) for legitimate users. If the data is transmitted in a secure form (for example, using cryptography) and the network protocols are partially known, then attacks at the lower three layers of the OSI model (see Fig. 1) will be most effective: