نتایج جستجو برای: jamming
تعداد نتایج: 3897 فیلتر نتایج به سال:
Storage jamming can degrade real-world activities that share stored data. Storage jamming is not prevented by access controls or cryptographic techniques. Verification to rule out storage jamming logic is impractical for shrink-wrapped software or low-cost custom applications. Detection mechanisms do offer more promise. In this paper, we model storage jamming and a detection mechanism, using Un...
-The effort of this article is regarding to detect jamming attacks in wireless networks. The Jamming detection and techniques have been proposed in the journalism. They established results by the authors are often CA and JADE as most of the jamming regions are closely marked, and they do not help to clearly differentiate jamming mechanisms. We explore a different jamming attack by discovering t...
This study proposes an anti-jamming scheme for linear frequency modulated (LFM) radars to combat smart noise jamming, which is a newly proposed pattern that is very effective against LFM radars. First, by utilizing the smeared spectrum technique, the chirp rates of the target return and jamming signal can be changed. The target return and jamming signal then exhibit different characteristics af...
Cognitive Radio promises to be a solution for the spectrum underutilization problems. However, security issues pertaining to Cognitive Radio technology are still an understudied topic. One of the prevailing such issues are intelligent radio frequency jamming attacks, where adversaries are able to exploit on-the-fly reconfigurability potentials and learning mechanisms of Cognitive Radios in orde...
Wireless local area networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though channel hopping technologies are effective against proactive types of jamming, it has been reported that reactive jammers could attack the targets through scanning busy channels. In this p...
This paper studies the impact of GPS jamming on GPS carrier-phase time transfer. To study this issue, at NIST, we have installed a commercial GPS jamming detector since 2014 April. During 2014 April – 2015 April, the detector detected more than 100 jamming events, though there had been a few outages of jamming detection. The jamming events usually last for less than 2 min. We find that almost a...
We deal with the difficulty of jamming under an interior risk representation. We present a challenger model of choose jamming attacks, and also define packet delivery techniques in which specific messages of “high importance” are targeted. Jamming attacks can severely interfere with the normal operation of wireless networks and, consequently, mechanisms are needed that can cope with jamming att...
Jamming has traditionally been studied as a mechanical phenomenon and characterized with mechanical order parameters. However, this approach is not meaningful in the "mechanical vacuum" of systems below jamming in which all mechanical properties are precisely zero. We find that the network of nearest neighbors and the geometric structure of the Voronoi cell contain well-defined and meaningful o...
This letter investigates the problem of anti-jamming communications in dynamic and unknown environment through on-line learning. Different from existing studies which need to know (estimate) the jamming patterns and parameters, we use the spectrum waterfall, i.e., the raw spectrum environment, directly. Firstly, to cope with the challenge of infinite state of raw spectrum information, a deep an...
Built upon a shared wireless medium, wireless sensor network is particularly vulnerable to jamming attacks. These attacks can easily be accomplished by an adversary by either bypassing MAC-layer protocols or emitting a radio signal targeted at jamming a particular channel. This paper considers a scenario where a sophisticated jammer jams an area in a multichannel wireless sensor network. The ja...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید