نتایج جستجو برای: based cooperative jamming

تعداد نتایج: 2985290  

Journal: :EURASIP Journal on Wireless Communications and Networking 2016

2014
Kresimir Dabcevic Muhammad Ozair Mughal Lucio Marcenaro Carlo S. Regazzoni

Cognitive Radio promises to be a solution for the spectrum underutilization problems. However, security issues pertaining to Cognitive Radio technology are still an understudied topic. One of the prevailing such issues are intelligent radio frequency jamming attacks, where adversaries are able to exploit on-the-fly reconfigurability potentials and learning mechanisms of Cognitive Radios in orde...

2014
Il-Gu Lee Hyunwoo Choi Yongdae Kim Seungwon Shin Myungchul Kim

Wireless local area networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though channel hopping technologies are effective against proactive types of jamming, it has been reported that reactive jammers could attack the targets through scanning busy channels. In this p...

Journal: :CoRR 2015
Pan Zhou Chenhui Hu Tao Jiang Dapeng Wu

Cognitive (Radio) (CR) Communications (CC) are mainly deployed within the environments of primary (user) communications, where the channel states and accessibility are usually stochastically distributed (benign or IID). However, many practical CC are also exposed to disturbing events (contaminated) and vulnerable jamming attacks (adversarial or non-IID). Thus, the channel state distribution of ...

2013
G. Bala Raju

Wireless networks now enjoy widespread commercial implementation because of their ease of use, low cost and setup. However, since accessing wireless media is much easier than tapping a wired network, then security becomes a serious concern when implementing any wireless network. We consider a particular class of Denial of Service (DoS) attacks called jamming attacks. In the simplest form of jam...

2013
Jingqi Wu

............................................................................................................................................................ i

Journal: :CoRR 2016
Parthajit Mohapatra Chandra R. Murthy Jemin Lee

In this work, the role of unidirectional limited rate transmitter cooperation is studied in the case of the 2user Z interference channel (Z-IC) with secrecy constraints at the receivers, on achieving two conflicting goals simultaneously: mitigating interference and ensuring secrecy. First, the problem is studied under the linear deterministic model. The achievable schemes for the deterministic ...

2008
Young-po Lee Seungsoo Yoo Sun Yong Kim Seokho Yoon

Due to its anti-jamming capability, chirp spread spectrum (CSS) technique has attracted much attention in the area of wireless communications. However, there has been little rigorous analysis for the anti-jamming performance of CSS-based communication systems. In this paper, we present analytic results on the anti-jamming performance of a CSS-based system: BER expressions are derived for a CSS-...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2012
Tianqi Shen Corey S O'Hern M D Shattuck

Typical quasistatic compression algorithms for generating jammed packings of purely repulsive, frictionless particles begin with dilute configurations and then apply successive compressions with the relaxation of the elastic energy allowed between each compression step. It is well known that during isotropic compression these systems undergo a first-order-like jamming transition at packing frac...

2011
Peter Langendoerfer Steffen Ortmann Stephan Kornemann

In this paper we shortly introduce our real-time jamming detection approach which can be executed on standard wireless sensor nodes.The benefits of our approach are that no thresholds need to be defined since it detects jamming based on deviations of the Received Signal Strength Indication (RSSI) and the fact that for doing so it needs only 422 Bytes of memory including execution code and store...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید