نتایج جستجو برای: mobile jammer

تعداد نتایج: 172187  

Journal: :IEEE Transactions on Communications 2022

With potential applications to short-packet communication, we address communication of low-latency messages in fast-fading channels under the presence a reactive jammer. Unlike traditional jammer, assume full-duplex (FD) jammer capable detecting pre-existing countermeasures and subsequently changing target frequency band. To facilitate reliable amidst strong adversary, propose non-coherent fast...

Journal: :CoRR 2014
SaiDhiraj Amuru Cem Tekin Mihaela van der Schaar R. Michael Buehrer

Can an intelligent jammer learn and adapt to unknown environments in an electronic warfare-type scenario? In this paper, we answer this question in the positive, by developing a cognitive jammer that adaptively and optimally disrupts the communication between a victim transmitter-receiver pair. We formalize the problem using a novel multi-armed bandit framework where the jammer can choose vario...

Journal: :CoRR 2015
Mwawi M. Nyirenda Siaw-Lynn Ng Keith M. Martin

In a frequency hopping multiple access (FHMA) system a set of users communicate simultaneously using frequency hopping sequences defined on the same set of frequency channels. A frequency hopping sequence specifies which channels to use as communication progresses. A set of frequency hopping sequences used in an FHMA is called a frequency hopping scheme (FHS). Much of the research on the perfor...

2013
Vincent Le Nir Bart Scheers

CogWave is a free and open-source software platform aiming at developing cognitive radio waveforms. Combining CogWave with USRP gives a rapid prototyping platform for physical layer design and algorithm validation through a realtime video, audio and text transmission. This paper presents the cognitive blind orthogonal frequency division multiplexing (OFDM) waveform implemented in the CogWave so...

2011
Francesco Renna Nicola Laurenti Yih-Chun Hu

Orthogonal frequency division multiplexing (OFDM) has been chosen as the physical layer solution for a large variety of emerging and future wireless networks, due to its robustness in coping with frequency selective channels and efficient transceiver implementation. Its adoption in the transmission architecture should therefore be properly taken into account when designing or analyzing security...

2001
Shoko Araki Shoji Makino Tsuyoki Nishikawa Hiroshi Saruwatari

Despite several recent proposals to achieve Blind Source Separation (BSS) for realistic acoustic signal, separation performance is still not enough. In particular, when the length of impulse response is long, performance is highly limited. In this paper, we show it is useless to be constrained by the condition, P T , where T is the frame size of FFT and P is the length of room impulse response....

Journal: :CoRR 2015
Sheng Wang Chunliang Chu

Jamming attacks could cause severe damage to Wireless Sensor Networks (WSNs). Once jamming attack occurs, the most urgent work is to get the position information of the jammer. Then safety measures to eliminate the jamming effects can be devised. In this paper, the jammer localization is conducted by geometric covering method to achieve a low energy consumption. And utilizing the power of the j...

2008
S. Aldırmaz L. Durak

An interference excision algorithm in direct-sequence spread spectrum (DS-SS) communication systems is introduced. The proposed excision algorithm is developed for linear frequency modulated (LFM) signals that have broadband frequency characteristics. It is based on the time-frequency analysis of received signals employing short-time Fourier transformation (STFT). To analyze the interference, S...

2010
Alexandros G. Fragkiadakis Vasilios A. Siris Nikos Petroulakis

In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting physical layer jamming attacks in wireless networks, by seeking changes in the statistical characteristics of the signal-to-noise ratio (SNR). Two types of algorithms are investigated: simple threshold algorithms and algorithms based on the cumulative sum change point detection procedure. The algori...

2007
Haihao Li Mei Liu Nuo Xu

The passive direction finding cross localization method is widely adopted in passive tracking, therefore there will exist masses of false intersection points. Eliminating these false intersection points correctly and quickly is a key technique in passive localization. A new method is proposed for passive locating and tracking multi-jammer target in this paper. It not only solves the difficulty ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید