نتایج جستجو برای: based cooperative jamming

تعداد نتایج: 2985290  

2012
Kwangsung Ju Kwangsue Chung

In a tactical field, wireless communication is prevailed among military agents and vehicles, but it is fragile by jamming attack from an adversary because of the wireless shared medium. Jamming attack is easily achieved by emitting continuous radio signal and it can interfere with other radio communications within the network. Channel switching over multiple channels or route detouring have bee...

2005
Jang-Wook Moon John M. Shea Tan F. Wong

Collaborative techniques have been proposed to improve communications in the presence of a hostile jammer. A distributed detection and decoding technique based on collaborative decoding has been shown to be effective for communications over non-fading channels for coherent communications. In this paper, we consider collaborative communications strategies for jamming channels in which the messag...

2015
ZHANG Yu LIU Feng HAN Jie

UAVs are attracting more and more attentions for their versatilities and low costs. This paper focuses on their security and considers launching jamming attacks on them. We firstly formulate the UAVs jamming problem. Secondly the PSO (Particle Swarm Optimization) algorithm is introduced and new metrics like AJRL (Area for jamming a receiving link) and NJRL (Number of AJRLs) are defined. Then we...

2012
M. KIRAN KUMAR

--In this we address the dynamical jamming problem in wireless mesh networks and although some research has been conducted on countering Jamming attacks. Generally Multipath source routing protocols allow a data source node to distribute the total traffic among available paths. We consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on ...

2017
Jing Guo Nan Zhao Zhutian Yang Richard Yu Yunfei Chen Victor C.M. Leung

Interference alignment (IA) is a prospective method to achieve interference management in wireless networks. On the other hand, jamming can be deemed either as a potential threat to degrade the performance of wireless networks, or as a helper to combat the eavesdropping for the legitimate networks. In this paper, we consider these two opposite scenarios, beneficial and adversarial jamming, towa...

Journal: :Wireless Communications and Mobile Computing 2016
Nadia Adem Bechir Hamdaoui Attila A. Yavuz

5G wireless networks will support massive connectivity mainly due to device-to-device communications. An enabling technology for device-to-device links is the dynamical spectrum access. The devices, which are equipped with cognitive radios, are to be allowed to reuse spectrum occupied by cellular links. The dynamical spectrum availability makes cognitive users switch between channels. Switching...

2013
Xiaoyi Pan Wei Wang Dejun Feng Jing Huang Qixiang Fu Guoyu Wang

The intermittent sampling repeater jamming (ISRJ) can only produce fake point scatterers in the down-range, while the timevarying frequency induced by rotational micro-motion dynamics blurs the image in the cross-range. This paper focuses on the combination of the above two methods to counter the inverse synthetic aperture radar (ISAR). Based on the signal models of coherent ISAR signal process...

Journal: :Electronics 2023

In underground mines, physical layer security (PLS) technology is a promising method for the effective and secure communication to monitor mining process. Therefore, in this paper, we investigate PLS of an amplify-and-forward relay-aided system power monitoring systems mining, with consideration multiple eavesdroppers. Explicitly, propose scheme cooperative jamming precoding full-duplex conside...

Journal: :IOP Conference Series: Materials Science and Engineering 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید