This document discusses selective jamming attacks in wireless networks and methods to prevent them. It begins by introducing the open nature of wireless networks leaves them vulnerable to jamming attacks. It then discusses different types of jamming attacks and notes that selective jamming, which targets specific important packets, is more effective than continuous jamming. The document proposes using cryptographic techniques like commitment schemes and puzzles combined with physical layer parameters to prevent real-time packet classification and selective jamming. It reviews related work on jamming attacks and defenses. Finally, it outlines the problem statement, system model, and the contribution of using symmetric encryption and resisting brute force block encryption attacks to reduce jamming through packet hiding.