نتایج جستجو برای: based cooperative jamming
تعداد نتایج: 2985290 فیلتر نتایج به سال:
Cognitive Radio promises to be a solution for the spectrum underutilization problems. However, security issues pertaining to Cognitive Radio technology are still an understudied topic. One of the prevailing such issues are intelligent radio frequency jamming attacks, where adversaries are able to exploit on-the-fly reconfigurability potentials and learning mechanisms of Cognitive Radios in orde...
Wireless local area networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though channel hopping technologies are effective against proactive types of jamming, it has been reported that reactive jammers could attack the targets through scanning busy channels. In this p...
Cognitive (Radio) (CR) Communications (CC) are mainly deployed within the environments of primary (user) communications, where the channel states and accessibility are usually stochastically distributed (benign or IID). However, many practical CC are also exposed to disturbing events (contaminated) and vulnerable jamming attacks (adversarial or non-IID). Thus, the channel state distribution of ...
Wireless networks now enjoy widespread commercial implementation because of their ease of use, low cost and setup. However, since accessing wireless media is much easier than tapping a wired network, then security becomes a serious concern when implementing any wireless network. We consider a particular class of Denial of Service (DoS) attacks called jamming attacks. In the simplest form of jam...
............................................................................................................................................................ i
In this work, the role of unidirectional limited rate transmitter cooperation is studied in the case of the 2user Z interference channel (Z-IC) with secrecy constraints at the receivers, on achieving two conflicting goals simultaneously: mitigating interference and ensuring secrecy. First, the problem is studied under the linear deterministic model. The achievable schemes for the deterministic ...
Due to its anti-jamming capability, chirp spread spectrum (CSS) technique has attracted much attention in the area of wireless communications. However, there has been little rigorous analysis for the anti-jamming performance of CSS-based communication systems. In this paper, we present analytic results on the anti-jamming performance of a CSS-based system: BER expressions are derived for a CSS-...
Typical quasistatic compression algorithms for generating jammed packings of purely repulsive, frictionless particles begin with dilute configurations and then apply successive compressions with the relaxation of the elastic energy allowed between each compression step. It is well known that during isotropic compression these systems undergo a first-order-like jamming transition at packing frac...
In this paper we shortly introduce our real-time jamming detection approach which can be executed on standard wireless sensor nodes.The benefits of our approach are that no thresholds need to be defined since it detects jamming based on deviations of the Received Signal Strength Indication (RSSI) and the fact that for doing so it needs only 422 Bytes of memory including execution code and store...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید