نتایج جستجو برای: jamming mitigation

تعداد نتایج: 36306  

2012
Mohammad J. Abdel Rahman Marwan Krunz

We address the problem of jamming mitigation of multicast communications in multi-channel ad hoc networks. Specifically, we develop two frequency hopping (FH) techniques for establishing multicast communications. These techniques, denoted by KFH and CFH, address the two following problems. First, establishing multicast communications in the presence of a control-channel jamming attack. Second, ...

1997
Matt Boggs

Many modern weapon systems depend on Global Positioning System (GPS) to achieve midcourse or terminal accuracy requirements. This reliance on GPS navigation dictates that weapon system test facilities be equipped to create realistic GPS jamming (GPSJ) environments. The Naval Air Warfare Center Weapons Division (NAWCWPNS) at China Lake is developing a system of free-space jammers to create a rea...

2014
Marc Lichtman Jeffrey H. Reed

In this paper, we propose a strategy to avoid or mitigate reactive forms of jamming using a reinforcement learning approach. The mitigation strategy focuses on finding an effective channel hopping and idling pattern to maximize link throughput. Thus, the strategy is well-suited for frequency-hopping spread spectrum systems, and best performs in tandem with a channel selection algorithm. By usin...

2015
Arif Sari

The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through c...

2009
David Slater Patrick Tague Radha Poovendran Mingyan Li

As wireless personal electronic devices (PEDs) become increasingly ubiquitous, the demand for wireless network services on commercial aircraft is likely to increase. Introduction of services to an aircraft network creates a host of wireless security challenges, whereby a passenger can use a wireless PED to potentially interfere with or jam valid network traffic and future inter-aircraft communi...

2017
Carolina Del-Valle-Soto J. Carlos Mex-Perera Raúl Monroy Juan Arturo Nolazco-Flores

In this work, we present the design of a mitigation scheme for jamming attacks integrated to the routing protocols MPH, AODV, and DSR. The resulting protocols are named MPH-M (Multi-Parent Hierarchical - Modified), AODV-M (Ad hoc On Demand Distance Vector - Modified), and DSR-M (Dynamic Source Routing - Modified). For the mitigation algorithm, if the detection algorithm running locally in each ...

2013
Roberto Di Pietro Gabriele Oligeri

Jamming techniques require just moderate resources to be deployed, while their effectiveness in disrupting communications is unprecedented. In this paper we introduce several contributions to jamming mitigation. In particular, we introduce a novel adversary model that has both (unlimited) jamming reactive capabilities as well as powerful (but limited) proactive jamming capabilities. Under this ...

Journal: :International Journal of Antennas and Propagation 2017

Journal: :EURASIP J. Adv. Sig. Proc. 2006
Yaron Seliktar Douglas B. Williams E. Jeff Holder

Mainbeam jamming poses a particularly difficult challenge for conventional monopulse radars. In such cases spatially adaptive processing provides some interference suppression when the target and jammer are not exactly coaligned. However, as the target angle approaches that of the jammer, mitigation performance is increasingly hampered and distortions are introduced into the resulting beam patt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید