نتایج جستجو برای: based cooperative jamming

تعداد نتایج: 2985290  

Journal: :IEEE Network 2021

The integration of unmanned aerial vehicle (UAV) networks and device-to-device (D2D) communications is expected to provide ubiquitous connectivity high-speed rates for sensitive information transmission in future wireless networks. However, the traditional cryptography physical layer security techniques still cannot prevent adversaries from knowing existence such that they further launch attack...

2015
R. Maheswari

Ms.S.Rajeswari. MCA., M.PHIL HOD of PG Computer science, SreeSaraswathiThyagaraja College Email ID:rajeswari75_gopal@ yahoo.co.in -------------------------------------------------------------------ABSTRACT--------------------------------------------------The works in this paper is about to MANET and classify jamming attacks in 802.11b wireless networks. The number of jamming attack and classifi...

2014
Archana Patil

Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks, referred to as jamming. Wireless sensor networks are based on shared medium which makes easy for opponent to conduct radio interference, or jamming, attacks that effectively cause a denial of service on transmitting and receiving functionalities. Typically, jamming has been addressed as a threat model. In...

2006
Chulho Won Jong-Hoon Youn Hesham H. Ali

Denial-Of-Service (DOS) attack is recognized as a biggest threat against the operation of large-scale wireless sensor networks (WSN). Especially, high-mobility radio jamming like vehicles carrying radio jamming device can cause a serious damage in performance of WSNs. Because of resource-constraint design of sensor node, it is hard to provide enough protection against high-mobility jamming atta...

2000
Mario Nicodemi

A statistical mechanical approach to granular material is proposed. Using lattice models from standard Statistical Mechanics and results from a mean field replica approach we find a jamming transition in granular media closely related to the glass transition in super-cooled liquids. These models reproduce the logarithmic relaxation in granular compaction and reversible-irreversible lines, in ag...

Journal: :thrita 0
maryam karbasi motlagh medical education development center, kerman university of medical sciences, kerman, ir iran; scientific research center, tehran university of medical sciences, tehran, ir iran atena rahmati najarkolai medical education development center, kerman university of medical sciences, kerman, ir iran fatemeh keshmiri department of medical education, school of medicine, tehran university of medical sciences, tehran, ir iran; department of medical education, school of medicine, tehran university of medical sciences, tehran, ir iran. tel: +98-2188989161, fax: +98-2122532761

conclusions meeting the prerequisites to incorporating tbl in the curriculum of medical universities plays a pivotal role in its success. accordingly, in the assessment of the curriculum of medical universities, these requirements should be fully identified and fulfilled so as to be able to devise appropriate plans for the success of teaching methods. context this review study, performed in 201...

2016
Kanghee Lee Inha Hyun Heonjoong Kim Sun Jo

A distributed multiuser two-way amplify-and-forward (AF) wireless relay strategy consisting of 2M sources (or 2M destinations) and N relays all equipped with single antenna per communication node is studied in this paper. All sources act as both sources and destinations with a self-interference cancelation process at the 2M destinations. The main objective is to design the closed-form of minimu...

2013
Ramalingam Sugumar

The jammer controls the probability of jamming and the transmission range in order to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by the network (namely by a monitoring node), and a notification message is transferred out of the jammed region. The jammer is detected by employing an optimal detection test based on th...

1998
Poompat Saengudomlert Muriel Médard Arthur C. Smith

Existing supervisory schemes which can be used for detecting jamming attacks in all-optical networks are mostly based on average power detection and the use of pilot signals. We point out that these methods are not adequate to handle all types of jamming attacks. Based on a newly designed attack detection device at a network node, a novel attack detection scheme against jamming attacks is propo...

Journal: :IEEE Internet of Things Journal 2023

Conventional anti-jamming methods mainly focus on preventing single jammer attacks with an invariant jamming policy or from multiple jammers similar policies. These are ineffective against a following several different policies distinct Therefore, this article proposes method that can adapt its to the current attack. Moreover, for scenario, estimates future occupied channels using jammers’ in p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید