نتایج جستجو برای: jamming mitigation
تعداد نتایج: 36306 فیلتر نتایج به سال:
In last few decades, there has been a wide demand of wireless sensor networks (WSNs) in extensive mission critical applications such as monitoring, industrial control, military, health and many more. The larger demand of WSN in mission critical applications makes it more prone towards malicious users who are trying to invade. These security assaults worsen the performance of WSN in large extent...
This paper illustrates how the tools of equilibrium statistical mechanics can help to describe a far-from-equilibrium problem: the jamming transition in frictionless granular materials. Edwards ideas consist of proposing a statistical ensemble of volume and stress fluctuations through the thermodynamic notion of entropy, compactivity, X, and angoricity, A (two temperature-like variables). We fi...
The jammer controls the probability of jamming and the transmission range in order to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by the network (namely by a monitoring node), and a notification message is transferred out of the jammed region. The jammer is detected by employing an optimal detection test based on th...
We consider communication in the presence of hostile jamming and block-fading. The jamming signal is modeled by a Gaussian two-state hidden Markov model. Both the communication signal and the jamming signal experience fading that is constant over each packet transmission. Under this scenario, the performance is very sensitive to errors in detecting which symbols are jammed and in the estimates ...
This paper considers spectrally efficient anti-jamming system design based on message-driven frequency hopping (MDFH). Unlike conventional FH where the hopping frequencies are determined by a preselected pseudonoise (PN) sequence, in MDFH, part of the message acts as the PN sequence for carrier frequency selection. It is observed that MDFH has high spectral efficiency and is particularly robust...
We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that covers both channel-oblivious and channel-aware jamming. We consider two channel-oblivious jammers: a periodic jammer that jams deterministically at a specified rate, and a memoryless jammer whose interfering signals arrive according to a Poisson process. We also develop new models for channel-aware jamming, ...
Anti-jamming games have become a popular research topic. However, there are not many publications devoted to such in the case of vehicular ad hoc networks (VANETs). We considered VANET anti-jamming game on road using realistic driving model. Further, we assumed quadratic power function both vehicle and jammer utility functions instead standard linear term. This makes model more realistic. Using...
The effect of the return from the platform on which a cross-eye jammer is mounted is significant in many practical cross-eye jamming scenarios. However, all published analyses of skin-return affected cross-eye jamming have significant limitations. These limitations are addressed by deriving equations for the distribution of the cross-eye gain in the presence of skin return. The value of these r...
We consider a land mobile satellite communication system using spread spectrum techniques where the uplink is exposed to MT jamming attacks, and the downlink is corrupted by multi-path fading channels. We proposes an anti-jamming receiver, which exploits inherent low-dimensionality of the received signal model, by formulating a robust principal component analysis (Robust PCA)-based recovery pro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید