The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Denial of Service (WDoS) attack. Recent studies show that these attacks can be easily accomplished using over-the-counter equipment. To give a simple example, a malicious node may continuously transmit a radio signal to block any legitimate access to the medium and / or interfere with reception. This act is called interference and malicious nodes are called jammers. Jamming techniques range from simple, based on the continuous transmission of interference signals, to more sophisticated attacks that aim to exploit the vulnerabilities of the particular protocol used.