نتایج جستجو برای: mobile jammers

تعداد نتایج: 171927  

Journal: :تحقیقات بازاریابی نوین 0
abdolghader pourali

mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. a mobile payment system should be beneficial for all related persons. for a payment system to be a successful system, end-user, seller, exporter and operators should see a additional value in it. end-user pr...

2012

The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such attacks can be very easily accomplished using off-the shelf equipment. To give a simple example, a malicious node can continually transmit a radio signal in order to block any legitimate access to the medium and/or interf...

2011
Rongqing Zhang Lingyang Song Zhu Han Bingli Jiao

In this paper, we investigate cooperation of conventional relays and friendly jammers subject to secrecy constraints for cooperative networks. In order to obtain an optimized secrecy rate, the source selects several conventional relays and friendly jammers from the intermediate nodes to assist data transmission, and in return, it needs to make a payment. Each intermediate node here has two poss...

2013
DIANA FONTANELLA ROLAND BAUERNFEIND

M A Y / J U N E 2 0 1 3 www.insidegnss.com GNSS technology constitutes a fundamental element for new intelligent transport systems (ITSs) and their applications, such as advanced driver assistance, dangerous goods tracking, and distance-based toll systems. Due to the weak strength of navigation signals from distant satellites, however, these applications are threatened by malicious as well as u...

2012
Nischay Bahl Ajay K. Sharma Harsh K. Verma Konstantinos Pelechrinis Marios Iliofotou Srikanth V. Krishnamurthy Robert Szewczyk Joseph Polastre Alan Mainwaring Adrian Perrig John Stankovic David Wagner JP Walters Yang Xiao Anthony D. Wood John A. Stankovic Sherif Khattab Daniel Mosse Wenyuan Xu Timothy Wood Wade Trappe Hung-Min Sun Shih-Pu Hsu

On denial-of-service (DoS) attacks for wireless sensor networks (WSNs), we investigated the security aspects of the physical layer. We conducted the simulative performance analysis of jamming attacks for signal-to-noise ratio (SNR), bit error rate (BER), network throughput and packet delivery ratio (PDR) using IEEE 802. 15. 4 based OPNET simulative model for WSN under constant and varying inten...

Journal: :Wireless Networks 2011
Xuan Jiang Wenhui Hu Sencun Zhu Guohong Cao

Jamming is a kind of Denial-of-Service attack in which an adversary purposefully emits radio frequency signals to corrupt the wireless transmissions among normal nodes. Although some research has been conducted on countering jamming attacks, few works consider jamming attacks launched by insiders, where an attacker first compromises some legitimate sensor nodes to acquire the common cryptograph...

Journal: :JCS 2014
R. Dhanasekaran G. Singaravel

Large number of low power, tiny radio jammers are constituting a Distributed Jammer Network (DJN) is used nowadays to cause a Denial of Service (DoS) attack on a Distributed Wireless Network (DWN). Using NANO technologies, it is possible to build huge number of tiny jammers in millions, if not more. The Denial of Service (DoS) attacks in Distributed Wireless Network (DWN) using Distributed Jamm...

2005
DAVID H. HUGHES Moeness G. Amin

Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید