نتایج جستجو برای: jamming

تعداد نتایج: 3897  

Journal: :The Journal of experimental biology 2014
Eri Takahashi Kiri Hyomoto Hiroshi Riquimaroux Yoshiaki Watanabe Tetsuo Ohta Shizuko Hiryu

The echolocation behavior of Pipistrellus abramus during exposure to artificial jamming sounds during flight was investigated. Echolocation pulses emitted by the bats were recorded using a telemetry microphone mounted on the bats' backs, and their adaptation based on acoustic characteristics of emitted pulses was assessed in terms of jamming-avoidance responses (JARs). In experiment 1, frequenc...

Journal: :IEEE Trans. Wireless Communications 2013
Lei Zhang Huahui Wang Tongtong Li

This is Part I of a two-part paper that considers antijamming system design in wireless networks based on messagedriven frequency hopping (MDFH), a highly efficient spread spectrum technique. In this paper, we first analyze the performance of MDFH under hostile jamming. It is observed that while MDFH is robust under strong jamming, it experiences considerable performance losses under disguised ...

2009
Lei Zhang Tongtong Li

This paper considers spectrally efficient anti-jamming system design based on message-driven frequency hopping (MDFH). As a highly efficient frequency hopping scheme, MDFH is particularly robust under strong jamming. However, disguised jamming from sources of similar power strength can cause performance losses. To overcome this drawback, in this paper, we first propose an anti-jamming MDFH (AJ-...

2017
LORENZO SIMONE

Direct Sequence/Spread-Spectrum (DSSS) signals are characterized by a wide bandwidth and a low-power spectral density. These characteristics make them very robust with respect to the jamming. The Jamming represents one of the main concerns for secure communication and communication in a crowded spectrum. When the jamming to signal power ratio is greater than the Process Gain, even the use of DS...

2004
I. Garvanov Ivan Popchev

In many practical situations, however, the environment is presence of strong pulse jamming (PJ) with high intensity; the pulse jamming is with binomial distribution. In this case, the pulse jamming can cause drastic degradation in the performance of Constant False Alarm Rate (CFAR) processors. In this paper, CA CFAR and CA CFAR BI (binary integration) processors in binomial distributed pulse ja...

2016
Wang Jun

Convolution false-targets jamming against LFM fire-control radars generates range and velocity false targets which are coherent with target echo, which increases the difficulty of jamming detection and suppression and makes the victim radar system lost the track of real target. To combat against this type of jamming, the uncorrelated characteristic between the jamming and echo in FRFT domain is...

2009
Zaw Htike Choong Seon Hong

Radio jamming attack is the most effective and easiest Denial-of –Service (DOS) attack in wireless network. In this paper, we proposed a multi-channel MAC protocol to mitigate the jamming attacks by using cognitive radio. The Cognitive Radio (CR) technology supports real-time spectrum sensing and fast channel switching. By using CR technologies, the legitimate nodes can perform periodic spectru...

2015
S. Raja Ratna R. Ravi

Wireless networks are built upon the open shared medium which makes easy for attackers to conduct malicious activities. Jamming is one of the most serious security threats to information economy and it must be dealt efficiently. Jammer prevents legitimate data to reach the receiver side and also it seriously degrades the network performance. The objective of this paper is to provide a general o...

2005
Melanie R. Rieback Bruno Crispo Andrew S. Tanenbaum

This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jammin...

1997
J. McDermott

Storage jamming [15] is malicious but surreptitious modification of stored data, to reduce its quality. The person initiating the storage jamming does not receive any direct benefit. Instead, the goal is more indirect, such as deteriorating the position of a competitor. We assume that a Trojan horse does the storage jamming, since the Trojan horse may access data that the attacker cannot. Manua...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید