The document presents methods to prevent selective jamming attacks in wireless networks. It discusses how selective jamming attacks can classify and target important packets in real-time. It then proposes and evaluates three schemes - a strong hiding commitment scheme, cryptographic puzzle hiding scheme, and hiding based on all-or-nothing transformations - to prevent real-time packet classification and mitigate these attacks by combining cryptography with physical layer attributes. The goal is to transform a selective jammer into a random jammer unable to efficiently target specific packets.