Optimal Jamming Attack Scheduling of Interactive Channels

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Feasibility of Channel Hopping in Jamming Attack

Currently deployed WLAN network use cooperative spectrum sharing and is prone to jamming based denial of service attack. In this article we propose a model to avoid jamming that use decentralized channel hopping algorithm. Upon detection of jamming, the network switches its channel of operation in accordance with pseudo-random sequence based rendezvous. We develop a testbed to evaluate the feas...

متن کامل

Optimal Denial-of-Service Attack Scheduling in Cyber-Physical Systems∗

Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some attacking patterns. In this paper, we investigate how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance. Specifically, we consider the scenario where a sensor sends its data to a remote ...

متن کامل

Jamming attack in MANET: A Selected Review

--A MANET is a collection of nodes that do not rely on a predefined infrastructure to keep the network connected Wireless sensor networks are being used in many applications like health monitoring, military purposes, and home automation. These networks are equipped with large number of sensors, which are spatially distributed. Wireless sensor networks are widely used in remote areas, defense an...

متن کامل

Capacity and optimal collusion attack channels for Gaussian fingerprinting games

In content fingerprinting, the same media covertext—image, video, audio, or text—is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to “remove” their fingerprints and forge a pirated copy. To trace the forgery back to members of the coali...

متن کامل

Activity Modelling and Countermeasures on Jamming Attack

In last few decades, there has been a wide demand of wireless sensor networks (WSNs) in extensive mission critical applications such as monitoring, industrial control, military, health and many more. The larger demand of WSN in mission critical applications makes it more prone towards malicious users who are trying to invade. These security assaults worsen the performance of WSN in large extent...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2020

ISSN: 2169-3536

DOI: 10.1109/access.2020.2995939