Eavesdropping: Using a sufficiently strong encryption and decryption technique one can obtain sound protection
against eavesdropping. Proper authentication and integrity mechanisms can ward off such active eavesdropping. On the other hand, a standard defense against jamming includes various forms of spread-spectrum (e.g., direct sequence spread-spectrum and frequency-hopping spread spectrum) and frequency-hopping communications and maintaining a low-duty cycle, locating a jamming area, and rerouting transmissions.