نتایج جستجو برای: mobile jammer
تعداد نتایج: 172187 فیلتر نتایج به سال:
With potential applications to short-packet communication, we address communication of low-latency messages in fast-fading channels under the presence a reactive jammer. Unlike traditional jammer, assume full-duplex (FD) jammer capable detecting pre-existing countermeasures and subsequently changing target frequency band. To facilitate reliable amidst strong adversary, propose non-coherent fast...
Can an intelligent jammer learn and adapt to unknown environments in an electronic warfare-type scenario? In this paper, we answer this question in the positive, by developing a cognitive jammer that adaptively and optimally disrupts the communication between a victim transmitter-receiver pair. We formalize the problem using a novel multi-armed bandit framework where the jammer can choose vario...
In a frequency hopping multiple access (FHMA) system a set of users communicate simultaneously using frequency hopping sequences defined on the same set of frequency channels. A frequency hopping sequence specifies which channels to use as communication progresses. A set of frequency hopping sequences used in an FHMA is called a frequency hopping scheme (FHS). Much of the research on the perfor...
CogWave is a free and open-source software platform aiming at developing cognitive radio waveforms. Combining CogWave with USRP gives a rapid prototyping platform for physical layer design and algorithm validation through a realtime video, audio and text transmission. This paper presents the cognitive blind orthogonal frequency division multiplexing (OFDM) waveform implemented in the CogWave so...
Orthogonal frequency division multiplexing (OFDM) has been chosen as the physical layer solution for a large variety of emerging and future wireless networks, due to its robustness in coping with frequency selective channels and efficient transceiver implementation. Its adoption in the transmission architecture should therefore be properly taken into account when designing or analyzing security...
Fundamental limitation of frequency domain blind source separation for convolutive mixture of speech
Despite several recent proposals to achieve Blind Source Separation (BSS) for realistic acoustic signal, separation performance is still not enough. In particular, when the length of impulse response is long, performance is highly limited. In this paper, we show it is useless to be constrained by the condition, P T , where T is the frame size of FFT and P is the length of room impulse response....
Jamming attacks could cause severe damage to Wireless Sensor Networks (WSNs). Once jamming attack occurs, the most urgent work is to get the position information of the jammer. Then safety measures to eliminate the jamming effects can be devised. In this paper, the jammer localization is conducted by geometric covering method to achieve a low energy consumption. And utilizing the power of the j...
An interference excision algorithm in direct-sequence spread spectrum (DS-SS) communication systems is introduced. The proposed excision algorithm is developed for linear frequency modulated (LFM) signals that have broadband frequency characteristics. It is based on the time-frequency analysis of received signals employing short-time Fourier transformation (STFT). To analyze the interference, S...
In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting physical layer jamming attacks in wireless networks, by seeking changes in the statistical characteristics of the signal-to-noise ratio (SNR). Two types of algorithms are investigated: simple threshold algorithms and algorithms based on the cumulative sum change point detection procedure. The algori...
The passive direction finding cross localization method is widely adopted in passive tracking, therefore there will exist masses of false intersection points. Eliminating these false intersection points correctly and quickly is a key technique in passive localization. A new method is proposed for passive locating and tracking multi-jammer target in this paper. It not only solves the difficulty ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید