نتایج جستجو برای: jamming mitigation

تعداد نتایج: 36306  

Journal: :Behavioural Processes 2016
Kazuma Hase Takara Miyamoto Kohta I. Kobayasi Shizuko Hiryu

In the presence of multiple flying conspecifics, echolocating bats avoid jamming by adjusting the spectral and/or temporal features of their vocalizations. However, little is known about how bats alter their pulse acoustic characteristics to adapt to an acoustically jamming situation during flight. We investigated echolocation behavior in a bat (Miniopterus fuliginosus) during free flight under...

2015
R. Maheswari

Ms.S.Rajeswari. MCA., M.PHIL HOD of PG Computer science, SreeSaraswathiThyagaraja College Email ID:rajeswari75_gopal@ yahoo.co.in -------------------------------------------------------------------ABSTRACT--------------------------------------------------The works in this paper is about to MANET and classify jamming attacks in 802.11b wireless networks. The number of jamming attack and classifi...

2014
Archana Patil

Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks, referred to as jamming. Wireless sensor networks are based on shared medium which makes easy for opponent to conduct radio interference, or jamming, attacks that effectively cause a denial of service on transmitting and receiving functionalities. Typically, jamming has been addressed as a threat model. In...

2008
Sherif M. Khattab Daniel Mossé Rami G. Melhem

Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of their applications. They are vulnerable, however, to jamming attacks, in which attackers block communication by radio interference or MAC-protocol violation. Two jamming countermeasures have been proposed, namely software...

2009
Soon Y. Oh Mario Gerla

Abstract—In this paper, we propose a novel multicast network coding protocol that is resilience to jamming attack in a tactical wireless ad hoc network. Wireless communication is prevailed in the tactical field between military agents and vehicles, but it is fragile by jamming attack from an adversary due to the wireless shared medium. A Jammer can easily disturb other wireless communications w...

2014
SaiDhiraj Amuru R. Michael Buehrer

Jamming attacks can significantly impact the performance of wireless communication systems, and can lead to significant overhead in terms of re-transmissions and increased power consumption. This paper considers the problem of optimal jamming over an additive white Gaussian noise channel. We derive the optimal jamming signal for various digital amplitudephase modulated constellations. We show t...

2006
Chulho Won Jong-Hoon Youn Hesham H. Ali

Denial-Of-Service (DOS) attack is recognized as a biggest threat against the operation of large-scale wireless sensor networks (WSN). Especially, high-mobility radio jamming like vehicles carrying radio jamming device can cause a serious damage in performance of WSNs. Because of resource-constraint design of sensor node, it is hard to provide enough protection against high-mobility jamming atta...

2014
Triet Dang Vo-Huu Rajmohan Rajaraman Bishal Thapa

Today’s trend of migrating radio devices from hardware to software provides potentials to create flexible applications for both commercial and military use. However, this raises security concerns, as malicious attacks can also be alleviated to break legitimate communications. In this research work, we study and build practical systems to mitigate the impact of some serious jamming threats: high...

2004
Sandeep Bhadra Sanjay Shakkottai Sriram Vishwanath

This paper uses jamming legitimate transmissions over a slotted ALOHA system as a means of covert communication. The resulting covert channel is found to be source dependent, and to have infinite memory. Hence, a characterization of the capacity of covert communication over such a medium is an inherently complex problem. Employing i.i.d. jamming strategies, this paper derives achievable rates f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید