نتایج جستجو برای: based cooperative jamming

تعداد نتایج: 2985290  

2000
Mika Ståhlberg

The dependence on Mobile Networks is growing. The success of the Internet was followed by Denial of Service attacks. What if the same happens to Mobile Networks? This paper gives an introduction to the concept of Radio Jamming and explores jamming resistance of two popular mobile networks: GSM and WLAN. Radio interfaces of the two systems are analysed and effective jamming-to-noise ratios are c...

Journal: :EURASIP J. Wireless Comm. and Networking 2009
Xiang He Aylin Yener

We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted rel...

2016
S. Rajeswari R. Maheswari

-The effort of this article is regarding to detect jamming attacks in wireless networks. The Jamming detection and techniques have been proposed in the journalism. They established results by the authors are often CA and JADE as most of the jamming regions are closely marked, and they do not help to clearly differentiate jamming mechanisms. We explore a different jamming attack by discovering t...

2006
Yalin Evren Sagduyu Anthony Ephremides

We study the selfish and malicious transmitter behavior in medium access control (MAC) layer of wireless networks with a general channel model based on the signalto-interference-plus-noise-ratio (SINR) achievable by multiple transmitters at a single receiver. We formulate the denial of service attacks in MAC operation as a non-cooperative game of selecting the individual transmission power leve...

2004
Mithun Acharya Tanu Sharma David Thuente David Sizemore

Total physical jamming in wireless networks can be realized by generating continuous high power noise in the vicinity of wireless receiver nodes. The purpose of this paper is to show, using OPNET simulations, that similar jamming effectiveness can be achieved with much lower total energy. In the first half of the paper, we study the effects of periodic jamming with various power levels on the n...

2006
MARIO ČAGALJ

Security is at the core of any communication system and, in particular, of wireless (radio) networks. In this thesis, we focus on three important security aspects in the framework of wireless networks: selfish (noncooperative) behavior at the Medium Access Control (MAC) layer, “radio channel jamming”-based Denial-of-Service (DoS) attacks against sensor networks and secure key agreement in peer-...

Journal: :دانش و پژوهش در آموزش زبان انگلیسی 0
mahdi mardani tahereh jahanbazian

the present study intended to look into and compare the possible effects of competitive team-based learning (ctbl) with learning together (lt) or cooperative group-based learning (cgbl) – the most popular method of cooperative learning (cl) -- on oral performance of iranian efl intermediate students. after administering the oral interview, this researcher selected a group of 40 almost homogeneo...

2017
Chao Zhou Feifeng Liu Quanhua Liu

The interrupted sampling repeater jamming (ISRJ) based on a digital radio frequency memory (DRFM) device is a new type of coherent jamming. This kind of jamming usually occurs as main-lobe jamming and has the advantages of low power requirements and easy parameter adjustment, posing a serious threat to the modern radar systems. In order to suppress the ISRJ, this paper proposes an adaptive tran...

Journal: :IEEE Transactions on Information Forensics and Security 2021

As the number of connected devices is exponentially increasing, security in Internet Things (IoT) networks presents a major challenge. Accordingly, this work we investigate secrecy performance multihop IoT assuming that each node equipped with only two antennas, and can operate both Half-Duplex (HD) Full-Duplex (FD) modes. Moreover, propose an FD Cooperative Jamming (CJ) scheme to provide highe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید