نتایج جستجو برای: based cooperative jamming
تعداد نتایج: 2985290 فیلتر نتایج به سال:
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LS...
This paper proposes a cooperative censoring spectrum sensing scheme based on dependent function of extension theory for Cognitive Radio Sensor Networks (CRSN). The scheme uses the dependent function of Extension theory to identify the presence or absence of the licensed user's (LU) signal, and then calculate the related degree through dependent function to identify the initial test results of l...
Built upon a shared wireless medium, wireless sensor network is particularly vulnerable to jamming attacks. These attacks can easily be accomplished by an adversary by either bypassing MAC-layer protocols or emitting a radio signal targeted at jamming a particular channel. This paper considers a scenario where a sophisticated jammer jams an area in a multichannel wireless sensor network. The ja...
The echolocation behavior of Pipistrellus abramus during exposure to artificial jamming sounds during flight was investigated. Echolocation pulses emitted by the bats were recorded using a telemetry microphone mounted on the bats' backs, and their adaptation based on acoustic characteristics of emitted pulses was assessed in terms of jamming-avoidance responses (JARs). In experiment 1, frequenc...
This is Part I of a two-part paper that considers antijamming system design in wireless networks based on messagedriven frequency hopping (MDFH), a highly efficient spread spectrum technique. In this paper, we first analyze the performance of MDFH under hostile jamming. It is observed that while MDFH is robust under strong jamming, it experiences considerable performance losses under disguised ...
Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, traditional spread spectrum techniques require that sender and receivers share a common secret in order to agree upon, for example, a common hopping sequence (in FH) or a common spreading code sequence (in DSSS). Such a re...
The compressed sensing (CS) theory is a novel way to break through the existent difficulty in ultra-wideband jamming method development. In this paper, the application of the CS theory in linear frequency modulated signal processing is introduced, a new retransmitted jamming system based on CS is designed with its composition and workflow. Then, two generation modes of jamming signal are illust...
Cooperative transmission is an emerging wireless communication technique that improves wireless channel capacity through multiuser cooperation in the physical layer. It is expected to have a profound impact on network performance and design. However, cooperative transmission can be vulnerable to selfish behaviors and malicious attacks, especially in its current design. In this paper, we investi...
In order to verify the chaff jamming performance, according to the time-frequency distribution and statistical characteristics of chaff echo, this paper presents a modeling and simulation method of chaff echo based on its mechanism of generation, Also it presents a simulation study of chaff echo signal based on LFM signals. The simulation results indicate that the generated chaff echo of this m...
Cognitive radio (CR) promises to be a solution for the spectrum underutilization problems. However, security issues pertaining to cognitive radio technology are still an understudied topic. One of the prevailing such issues are intelligent radio frequency (RF) jamming attacks, where adversaries are able to exploit on-the-fly reconfigurability potentials and learning mechanisms of cognitive radi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید