نتایج جستجو برای: jamming mitigation
تعداد نتایج: 36306 فیلتر نتایج به سال:
In the presence of multiple flying conspecifics, echolocating bats avoid jamming by adjusting the spectral and/or temporal features of their vocalizations. However, little is known about how bats alter their pulse acoustic characteristics to adapt to an acoustically jamming situation during flight. We investigated echolocation behavior in a bat (Miniopterus fuliginosus) during free flight under...
Ms.S.Rajeswari. MCA., M.PHIL HOD of PG Computer science, SreeSaraswathiThyagaraja College Email ID:rajeswari75_gopal@ yahoo.co.in -------------------------------------------------------------------ABSTRACT--------------------------------------------------The works in this paper is about to MANET and classify jamming attacks in 802.11b wireless networks. The number of jamming attack and classifi...
Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks, referred to as jamming. Wireless sensor networks are based on shared medium which makes easy for opponent to conduct radio interference, or jamming, attacks that effectively cause a denial of service on transmitting and receiving functionalities. Typically, jamming has been addressed as a threat model. In...
Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of their applications. They are vulnerable, however, to jamming attacks, in which attackers block communication by radio interference or MAC-protocol violation. Two jamming countermeasures have been proposed, namely software...
Abstract—In this paper, we propose a novel multicast network coding protocol that is resilience to jamming attack in a tactical wireless ad hoc network. Wireless communication is prevailed in the tactical field between military agents and vehicles, but it is fragile by jamming attack from an adversary due to the wireless shared medium. A Jammer can easily disturb other wireless communications w...
Jamming attacks can significantly impact the performance of wireless communication systems, and can lead to significant overhead in terms of re-transmissions and increased power consumption. This paper considers the problem of optimal jamming over an additive white Gaussian noise channel. We derive the optimal jamming signal for various digital amplitudephase modulated constellations. We show t...
Denial-Of-Service (DOS) attack is recognized as a biggest threat against the operation of large-scale wireless sensor networks (WSN). Especially, high-mobility radio jamming like vehicles carrying radio jamming device can cause a serious damage in performance of WSNs. Because of resource-constraint design of sensor node, it is hard to provide enough protection against high-mobility jamming atta...
Today’s trend of migrating radio devices from hardware to software provides potentials to create flexible applications for both commercial and military use. However, this raises security concerns, as malicious attacks can also be alleviated to break legitimate communications. In this research work, we study and build practical systems to mitigate the impact of some serious jamming threats: high...
This paper uses jamming legitimate transmissions over a slotted ALOHA system as a means of covert communication. The resulting covert channel is found to be source dependent, and to have infinite memory. Hence, a characterization of the capacity of covert communication over such a medium is an inherently complex problem. Employing i.i.d. jamming strategies, this paper derives achievable rates f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید