نتایج جستجو برای: mobile jammers
تعداد نتایج: 171927 فیلتر نتایج به سال:
mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. a mobile payment system should be beneficial for all related persons. for a payment system to be a successful system, end-user, seller, exporter and operators should see a additional value in it. end-user pr...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such attacks can be very easily accomplished using off-the shelf equipment. To give a simple example, a malicious node can continually transmit a radio signal in order to block any legitimate access to the medium and/or interf...
In this paper, we investigate cooperation of conventional relays and friendly jammers subject to secrecy constraints for cooperative networks. In order to obtain an optimized secrecy rate, the source selects several conventional relays and friendly jammers from the intermediate nodes to assist data transmission, and in return, it needs to make a payment. Each intermediate node here has two poss...
M A Y / J U N E 2 0 1 3 www.insidegnss.com GNSS technology constitutes a fundamental element for new intelligent transport systems (ITSs) and their applications, such as advanced driver assistance, dangerous goods tracking, and distance-based toll systems. Due to the weak strength of navigation signals from distant satellites, however, these applications are threatened by malicious as well as u...
On denial-of-service (DoS) attacks for wireless sensor networks (WSNs), we investigated the security aspects of the physical layer. We conducted the simulative performance analysis of jamming attacks for signal-to-noise ratio (SNR), bit error rate (BER), network throughput and packet delivery ratio (PDR) using IEEE 802. 15. 4 based OPNET simulative model for WSN under constant and varying inten...
Jamming is a kind of Denial-of-Service attack in which an adversary purposefully emits radio frequency signals to corrupt the wireless transmissions among normal nodes. Although some research has been conducted on countering jamming attacks, few works consider jamming attacks launched by insiders, where an attacker first compromises some legitimate sensor nodes to acquire the common cryptograph...
Large number of low power, tiny radio jammers are constituting a Distributed Jammer Network (DJN) is used nowadays to cause a Denial of Service (DoS) attack on a Distributed Wireless Network (DWN). Using NANO technologies, it is possible to build huge number of tiny jammers in millions, if not more. The Denial of Service (DoS) attacks in Distributed Wireless Network (DWN) using Distributed Jamm...
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید